Communication has an important role in multirobot systems. It can facilitate cooperation, therefore, improve the performance of the system significantly. In this study we investigated the benefits of networked communi...
详细信息
ISBN:
(纸本)9789639799516
Communication has an important role in multirobot systems. It can facilitate cooperation, therefore, improve the performance of the system significantly. In this study we investigated the benefits of networked communication by experimentally evaluating the results of two search algorithms which are spiral search and informed random search. The experiments were performed in an experimental area containing obstacles and using e-puck robots where the communication ranges were "simulated" with the help of an overhead camera. Each robot was allowed to (i) keep an occupancy grid based local map of the environment containing also information about the cells it has visited and (ii) exchange this information with the other robots within its communication range. The effect of the size of communication range on the performance of the system defined as the time of completion of the search task (i.e, locating the target), was investigated.
The creation of wireless sensor networks provides a capable solution for a range of ubiquitous information services. Its challenges like, data security and secrecy due to its hostile deployment nature of being flat to...
详细信息
In the blog network, the posts in a blog can be diffused to other blogs through trackbacks and scraps. Analyzing information diffusion in the blog network is an important research issue that can be used for predicting...
详细信息
ISBN:
(纸本)9781605586762
In the blog network, the posts in a blog can be diffused to other blogs through trackbacks and scraps. Analyzing information diffusion in the blog network is an important research issue that can be used for predicting information diffusion, detecting abnormality, marketing, and revitalizing the blog world. Existing studies on information diffusion in a blog network define explicit relationships between blogs and analyze the word-of-mouth effect through such explicit relationships only. However, it has been observed that more than 85% of all information diffusion in a blog network occurs through non-explicit relationships. In this paper, we propose a new model that considers both the explicit and non-explicit relationships between blogs in order to explain the information diffusion phenomena in a blog network. We add a super node and the relationships between the super node and blogs as broadcast edges and register edges to the existing information diffusion model and assign the assimilation probability to every relationship. The expanded information diffusion model improves the accuracy of the basic model by taking into account the degrees of diffusion powers of posts. We verify the superiority of the proposed model through extensive experiments of information diffusion at a real blog network. The experimental results show that our expanded information diffusion model generates 77% less errors than the existing model. Copyright 2009 ACM.
In a blog network, there are special users who induce other users to actively utilize blog services. In this paper, these users whose contents exhibit large influence over other users are defined as Content Power User...
详细信息
ISBN:
(纸本)9781605586762
In a blog network, there are special users who induce other users to actively utilize blog services. In this paper, these users whose contents exhibit large influence over other users are defined as Content Power Users (CPUs). Accurately determining who content power users are in a blog network is important in order to establish an effective business policy that stimulates usage of blog services. In this paper, we propose a new method of determining content power users. First, we measure the influence of each document owned by individual users. Since the influence of a document tends to be high with long exposure, we adjust the value of influence of a document based on exposure duration. Then, by adding up the values of influence of all the documents owned by each user, we calculate the influence of the corresponding user. We analyze the performance of our method, by applying the proposed method to an actual blog network and comparing its results to those of preexisting methods for determining power users. The experimental results demonstrate that our method is well suited for the dynamic nature of the blog network. Copyright 2009 ACM.
To address the scalability problem in attack graphs generation, we propose a novel method to generate attack graphs automatically. Our approach constructs a two-tier attack graph framework, which includes a host acces...
详细信息
ISBN:
(纸本)9780769537580
To address the scalability problem in attack graphs generation, we propose a novel method to generate attack graphs automatically. Our approach constructs a two-tier attack graph framework, which includes a host access graph and some sub-attack graphs. A subattack graph describes concrete attack scenarios from one source host to one target host, while the host access graph describes the attacker's privilege transition among hosts. Our sub-attack graphs and host access graph have remarkable smaller scales and can help network administrators to find the key hosts in attack sequences. Analysis shows that the upper bound computational cost of our model is O(N3), which could also be competed in real time. The following experiment validates our approach.
The energy of node in Wireless Sensor Networks (WSN) is severely constrained, it is very important to maximize the network lifetime by reducing the data dissemination among the nodes. In order to enhance energy effici...
详细信息
This paper gives an overview of some recent advances in topological approaches to analog layout synthesis and in layout-aware analog sizing. The core issue in these approaches is the modeling of layout constraints for...
详细信息
Intelligent post-processing of data mining results can provide valuable knowledge. In this paper we present the first systematic solution to post-processing that is based on semantic web technologies. The framework in...
详细信息
A general model of oil consumption is investigated in this study. This model should be applicable to different countries even with different characteristics. Conventional model that works very well for Malaysia is tes...
详细信息
A general model of oil consumption is investigated in this study. This model should be applicable to different countries even with different characteristics. Conventional model that works very well for Malaysia is tested with seven developing Asian countries: China, India, Indonesia, Malaysia, Pakistan, Philippines, and Thailand. The results have shown that this model can not produce a good fit to original data. A modification of Autoregressive Exogenous (ARX) model is proposed and tested. Data are separated into training and validation dataset where the number of validation dataset is higher than the number of training dataset. The results have shown that the proposed model can be considered as a general model where all countries except Philippines can produce a good fit to original data.
We demonstrate two- and full three-dimensional simulation of an active silicon-based photonic crystal chromatic dispersion compensator with low power consumption of 114nW and functioning at 40.5MHz. The novel device a...
详细信息
暂无评论