The teaching of software development methods in undergraduate computerscience and software engineering programs was studied. The teaching of Extreme Programming (XP), which is one of the agile software development me...
详细信息
ISBN:
(纸本)1581137982
The teaching of software development methods in undergraduate computerscience and software engineering programs was studied. The teaching of Extreme Programming (XP), which is one of the agile software development methods, was in particular studied. XP is based on four values that are expressed by 12 practices. The four XP values are communication, simplicity, feedback, and courage.
Bug algorithms are a class of popular algorithms for autonomous robot navigation in unknown environments with local information. Very natural, with low memory requirements, Bug strategies do not yet allow any competit...
详细信息
ISBN:
(纸本)0780384636
Bug algorithms are a class of popular algorithms for autonomous robot navigation in unknown environments with local information. Very natural, with low memory requirements, Bug strategies do not yet allow any competitive analysis. The bound on the robot's path changes from scene to scene depending on the obstacles, even though a new obstacle may not alter the length of the shortest path. We propose a new competitive algorithm, Cautious Bug, whose competitive factor has an order of O(dm-1), where d is the length of the optimal path from starting point S to a target point T. m = 2 #Min-1 and #Min denote the number of the distance function isolated local minima points in the given environment Simulations were performed to study the average competitive factor of the algorithm.
We introduce a game-theoretic setting for routing in a mobile ad hoc network that consists of greedy, selfish agents who accept payments for forwarding data for other agents if the payments cover their individual cost...
详细信息
ISBN:
(纸本)9781581137538
We introduce a game-theoretic setting for routing in a mobile ad hoc network that consists of greedy, selfish agents who accept payments for forwarding data for other agents if the payments cover their individual costs incurred by forwarding data. In this setting, we propose Ad hoc-VCG, a reactive routing protocol that achieves the design objectives of truthfulness (i.e., it is in the agents' best interest to reveal their true costs for forwarding data) and cost-efficiency (i.e., it guarantees that routing is done along the most cost-efficient path) in a game-theoretic sense by paying to the intermediate nodes a premium over their actual costs for forwarding data packets. We show that the total overpayment (i.e., the sum of all premiums paid) is relatively small by giving a theoretical upper bound and by providing experimental evidence. Our routing protocol implements a variation of the well-known mechanism by Vickrey, Clarke, and Groves in a mobile network setting. Finally, we analyze a very natural routing protocol that is an adaptation of the Packet Purse Model with auctions in our setting and show that, unfortunately, it does not achieve cost-efficiency or truthfulness.
Identification of drug target proteins is an important process in drug discovery and development. To perform predictions of large-scale drug-Target interactions, many computational methods have been proposed using the...
详细信息
Nanomachines such as nanorobots working either in vacuum or in a fluid as mobile machines themselves become the size of the order of the Brownian particle, a nanoparticle free floating in the fluid. For nanomachines w...
详细信息
Nanomachines such as nanorobots working either in vacuum or in a fluid as mobile machines themselves become the size of the order of the Brownian particle, a nanoparticle free floating in the fluid. For nanomachines working in fluids, the thermal agitation around the machine influences its movement to a greater degree. The nanomachine itself is modeled as a sphere of radius r and proof mass m, which is thermally agitated by fluid particles in a time continuum. The thermal impact equals white noise. A model of the nanoparticle, considering it as an elastic body inst.ad of assuming it as rigid, has been developed by considering the impact process in different ways. The stochastic motion indexes, mean, and variances, were obtained for different models using a correlation technique, with a validity constraint that variance cannot be negative. A probable model has been found that survived universally the constraint test accounting for the Brownian and non-Brownian motion, simultaneously. The model predictions have been verified and were found in good agreement with published experimental results.
Given a set S of n points in the plane, a minimum-dilation spanning tree of S is a tree with vertex set S of smallest possible dilation. We show that given a set S of n points and a dilation δ > 1, it is NP-hard t...
We extend the notion of unital as well as unitary polarity from finite projective planes to arbitrary symmetric designs. The existence of unitals in several families of symmetric designs has been proved. It is shown t...
详细信息
We extend the notion of unital as well as unitary polarity from finite projective planes to arbitrary symmetric designs. The existence of unitals in several families of symmetric designs has been proved. It is shown that if a unital in a point-hyperplane design PG
d-1(d,q) exists, then d = 2 or 3; in particular, unitals and ovoids are equivalent in case d = 3. Moreover, unitals have been found in two designs having the same parameters as the PG
4(5,2), although the latter does not have a unital. It had been not known whether or not a nonclassical design exists, which has a unitary polarity. Fortunately, we have discovered a unitary polarity in a symmetric 2-(45,12,3) design. To a certain extent this example seems to be exceptional for designs with these parameters.
The goal of this paper is to propose a system that can extract formal semantic knowledge representation from natural language eGov policies. We present an architecture that allows for extracting Controlled Natural Lan...
详细信息
The application of petri nets for task supervision in humanoid robots is described. In contrast to industrial applications, humanoid robots act in complex, permanently changing environments. It require a fully functio...
详细信息
The application of petri nets for task supervision in humanoid robots is described. In contrast to industrial applications, humanoid robots act in complex, permanently changing environments. It require a fully functional control architecture for task planning, coordination, execution, and supervision. Many robot control architectures base on a hierarchical three-layered concept including levels for planning, coordination, and execution. Most of the routine tasks and some expected exceptional circumstances during the execution of a task are planned in advance. Petri nets are used to describe such robot tasks with sequential and parallel actions.
In this paper, we first introduced the concept of Cartesian product files. We then derived a formula for random files. A computer simulation experiment was performed to compare these two file.s. So far as shown by the...
详细信息
暂无评论