In this work, we present a new approach for designing an autonomous bicycle robot. It is well known that bicycles can be laterally stable at certain velocities. This means that if the steering bar remains free to rota...
详细信息
This paper considers the time consistency of multistage cooperative games in which there are multiple optimal trajectories with complete information. In dynamic cooperative games, an important condition for the distri...
详细信息
Deep learning(DL),which includes deep reinforcement learning(DRL),holds great promise for carrying out real-world tasks that human minds seem to cope with quite *** promise is already delivering extremely impressive r...
详细信息
Deep learning(DL),which includes deep reinforcement learning(DRL),holds great promise for carrying out real-world tasks that human minds seem to cope with quite *** promise is already delivering extremely impressive results in a variety of ***,while DL-enabled systems achieve excellent performance,they are far from *** has been demonstrated,in several domains,that DL systems can err when they encounter cases they had not hitherto ***,the opacity of the produced agents makes it difficult to explain their behavior and ensure that they adhere to various requirements posed by human *** the other end of the software development spectrum of methods,behavioral programming(BP) facilitates orderly system development using self-standing executable modules aligned with how humans intuitively describe desired system *** this paper,we elaborate on different approaches for combining DRL with BP and,more generally,machine learning(ML) with executable specifications(ES).We begin by defining a framework for studying the various approaches,which can also be used to study new emerging approaches not covered *** then briefly review state-of-the-art approaches to integrating ML with ES,continue with a focus on DRL,and then present the merits of integrating ML with *** conclude with guidelines on how this categorization can be used in decision making in system development,and outline future research challenges.
In the cloud environment,ensuring a high level of data security is in high *** planning storage optimization is part of the whole security process in the cloud *** enables data security by avoiding the risk of data lo...
详细信息
In the cloud environment,ensuring a high level of data security is in high *** planning storage optimization is part of the whole security process in the cloud *** enables data security by avoiding the risk of data loss and data *** development of data flow scheduling approaches in the cloud environment taking security parameters into account is *** our work,we propose a data scheduling model for the cloud *** is made up of three parts that together help dispatch user data flow to the appropriate *** first component is the Collector Agent whichmust periodically collect information on the state of the network *** second one is the monitoring agent which must then analyze,classify,and make a decision on the state of the link and finally transmit this information to the *** third one is the scheduler who must consider previous information to transfer user data,including fair distribution and reliable *** should be noted that each part of the proposedmodel requires the development of its *** this article,we are interested in the development of data transfer algorithms,including fairness distribution with the consideration of a stable link *** algorithms are based on the grouping of transmitted files and the iterative *** proposed algorithms showthe performances to obtain an approximate solution to the studied problem which is an NP-hard(Non-Polynomial solution)*** experimental results show that the best algorithm is the half-grouped minimum excluding(HME),with a percentage of 91.3%,an average deviation of 0.042,and an execution time of 0.001 s.
Many papers in the intersection of theoretical and applied algorithms show that the simple, asymptotically less efficient algorithm, performs better than the bestcomplex theoretical algorithms on random data or in spe...
详细信息
Many papers in the intersection of theoretical and applied algorithms show that the simple, asymptotically less efficient algorithm, performs better than the bestcomplex theoretical algorithms on random data or in specialized “real world” applications. This paper considers the Knuth–Morris–Pratt automaton, and shows a counter-intuitive practical result. The classical pattern matching paradigm is that of seeking occurrences of one string—the pattern, in another—the text, where both strings are drawn from an alphabet set Σ. Assuming the text length is n and the pattern length is m, this problem can naively be solved in time O(nm). In Knuth, Morris and Pratt’s seminal paper of 1977, an automaton, was developed that allows solving this problem in time O(n) for any alphabet. This automaton, which we will refer to as the KMP-automaton, has proven useful in solving many other problems. A notable example is the parameterized pattern matching model. In this model, a consistent renaming of symbols from Σ is allowed in a match. The parameterized matching paradigm has proven useful in problems in software engineering, computer vision, and other applications. It has long been believed that for texts where the symbols are uniformly random, the naive algorithm will perform as well as the KMP algorithm. In this paper, we examine the practical efficiency of the KMP algorithm versus the naive algorithm on a randomly generated text. We analyze the time under various parameters, such as alphabet size, pattern length, and the distribution of pattern occurrences in the text. We do this for both the original exact matching problem and parameterized matching. While the folklore wisdom is vindicated by these findings for the exact matching case, surprisingly, the KMP algorithm always works significantly faster than the naive in the parameterized matching case. We check this hypothesis for DNA texts and image data and observe a similar behavior as in the random text. We also show a very stru
Robust estimation of the essential matrix, which encodes the relative position and orientation of two cameras, is a fundamental step in structure from motion pipelines. Recent deep-based methods achieved accurate esti...
详细信息
Image-to-fMRI encoding is important for both neuroscience research and practical applications. However, such "Brain-Encoders" have been typically trained per-subject and per fMRI-dataset, thus restricted to ...
详细信息
We are currently in a period of upheaval, as many new technologies are emerging that open up new possibilities to shape our everyday lives. Particularly, within the field of Personalized Human-computer Interaction we ...
详细信息
Rarity meters are incorporated by industry and discursive by academia. Rarity, as an intuitive term, attracted numerous researchers to present their own view of it. While there is existing literature on comparing rari...
详细信息
We consider a graph coloring algorithm that processes vertices in order taken uniformly at random and assigns colors to them using First-Fit strategy. We show that this algorithm uses, in expectation, at most (1 + o(1...
详细信息
暂无评论