Since smartphones have stored diverse sensitive privacy information, including credit card and so on, a great deal of malware are desired to tamper them. As one of the most prevalent platforms, Android contains sensit...
详细信息
Landmark heuristics are perhaps the most accurate current known admissible heuristics for optimal planning. A disjunctive action landmark can be seen a form of at-least-one constraint on the actions it contains. In ma...
In order to reduce network traffic in distributed virtual environment, combined LOD techniques with active interest management based on layered interest management, a layered filtering method based on multi-resolution...
详细信息
During the development of a software, its source code is continuously being modified. Even after the deployment, the maintenance work still involves changing the source code. Some of the modification performed on the ...
详细信息
State Machine Diagram (SMD) is one of the SysML behavior diagrams, but it is a kind of semi-formal model language. As a consequence, models can not be verified conveniently and efficiently, especially in real-time emb...
详细信息
Modern real time embedded systems are typically composed of multiple functional and nonfunctional concerns with nonfunctional concerns affect the former in many aspects. MARTE, an extension profile of UML2, aims to be...
详细信息
Current modeling of infectious diseases allows for the study of complex and realistic scenarios that go from the population to the individual level of description. However, most epidemic models assume that the spreadi...
详细信息
Current modeling of infectious diseases allows for the study of complex and realistic scenarios that go from the population to the individual level of description. However, most epidemic models assume that the spreading process takes place on a single level (be it a single population, a metapopulation system, or a network of contacts). In particular, interdependent contagion phenomena can be addressed only if we go beyond the scheme-one pathogen-one network. In this paper, we propose a framework that allows us to describe the spreading dynamics of two concurrent diseases. Specifically, we characterize analytically the epidemic thresholds of the two diseases for different scenarios and compute the temporal evolution characterizing the unfolding dynamics. Results show that there are regions of the parameter space in which the onset of a disease’s outbreak is conditioned to the prevalence levels of the other disease. Moreover, we show, for the susceptible-infected-susceptible scheme, that under certain circumstances, finite and not vanishing epidemic thresholds are found even at the limit for scale-free networks. For the susceptible-infected-removed scenario, the phenomenology is richer and additional interdependencies show up. We also find that the secondary thresholds for the susceptible-infected-susceptible and susceptible-infected-removed models are different, which results directly from the interaction between both diseases. Our work thus solves an important problem and paves the way toward a more comprehensive description of the dynamics of interacting diseases.
Community detection in bipartite network is very important in the research on the theory and applications of complex network analysis. In this paper, an algorithm for detecting community structure in bipartite network...
详细信息
Communication networks are vulnerable to the natural disasters or malicious attacks, which may cause a large area of corruptions and long term disconnection of network services. Such significant outage has become a se...
详细信息
By using link mining method, we can understand associations among persons in enterprises. In this paper, we propose a link mining model called a bi-directional link mining, which is capable of predicting edges that do...
详细信息
By using link mining method, we can understand associations among persons in enterprises. In this paper, we propose a link mining model called a bi-directional link mining, which is capable of predicting edges that do not exist but may appear in the future in dynamic multi-dimensional networks. Firstly, we construct a dynamic multi-dimensional networks from an E-mail network and a telephone network, which makes us correctly describe a Group's staff relationship. Then we present some algorithms to build a reduction dimensional network and a dynamic network. After that, we give bi-directional link mining methods in a dynamic multi-dimensional weighted network and apply these methods in the enterprise's employee relational network. Experimental results show that these methods can effectively predict associations among persons in a large scale employee networks.
暂无评论