It is a big challenge to clearly identify the boundary between positive and negative streams. Several attempts have used negative feedback to solve this challenge;however, there are two issues for using negative relev...
详细信息
User authentication plays an important role to ensure that only authorized users can access resources. Kim et al. proposed a remote user authentication scheme based on the Rabin cryptosystem to resist well-known attac...
详细信息
Data are organized/stored in a plethora of different databases, locations and data models. In many cases, companies and organizations utilize data stored in a variety of data models at remote database servers. A chall...
详细信息
The cyclic scheduling problem modeled in terms of Cyclic Concurrent Process Systems is considered. The problem can be seen as a kind of Diophantine problem, hence its solvability, i.e. schedulability, plays a pivotal ...
详细信息
We adopt a utilitarian perspective on social choice, assuming that agents have (possibly latent) utility functions over some space of alternatives. For many reasons one might consider mechanisms, or social choice func...
详细信息
Cognitive Infocommunications (CogInfoCom) is an emerging discipline that investigates synergies between infocommunications and the cognitive sciences, with the goal of creating engineering applications in which system...
详细信息
An important challenge in CogInfoCom is to design multi-sensory signals which are capable of communicating high-level information to users. The concept of CogInfoCom channels was proposed in order to facilitate both t...
The paper investigates a novel monitoring trail (m-trail) scenario that can enable any shared protection scheme for achieving all-optical and ultra-fast failure restoration. Given a set of working (W-LPs) and protecti...
详细信息
ISBN:
(纸本)9781467359443
The paper investigates a novel monitoring trail (m-trail) scenario that can enable any shared protection scheme for achieving all-optical and ultra-fast failure restoration. Given a set of working (W-LPs) and protection (P-LPs) lightpaths, we firstly define the neighborhood of a node, which is a set of links whose failure states should be known to the node in restoration of the corresponding W-LPs. A set of m-trails is routed such that each node can localize any failure in its neighborhood according to the ON-OFF status of the traversing m-trails. Bound analysis is performed on the minimum bandwidth required for the m-trails. Extensive simulation is conducted to verify the proposed scheme.
Prototype selection, as a preprocessing step in machine learning, is effective in decreasing the computational cost of classification task by reducing the number of retained instances. This goal is obtained by shrinki...
详细信息
This paper is a conceptual presentation of a standardized museum database capable of exchanging information across various museum exhibitions in different countries. The design is a result of a study conducted on the ...
详细信息
暂无评论