Here we propose a novel method to compute surface hyperbolic parameterization for studying brain morphology with the Ricci flow method. Two surfaces are conformally equivalent if there exists a bijective angle-preserv...
详细信息
作者:
Lee, JoohyungSchool of Computing
Informatics and Decision Systems Engineering Arizona State University Tempe AZ 85287 United States
Action language C+ is a high level notation of nonmonotonic causal logic for describing properties of actions. The definite fragment of C+ is implemented in Version 2 of the Causal Calculator (CCalc) based on the redu...
详细信息
The deterministic construction of measurement matrices for compressive sensing is a challenging problem, for which a number of combinatorial techniques have been developed. One of them employs a widely used column rep...
详细信息
The advent of social media has spawned a surge of open-source, user-created intelligence available through online media such as blogs, wikis and social networks. This session will outline reflections on and work towar...
详细信息
The advent of social media has spawned a surge of open-source, user-created intelligence available through online media such as blogs, wikis and social networks. This session will outline reflections on and work towards harnessing the power of social media for instructional purposes by incorporating empirically-derived instructional design principles to scaffold their use. It specifically addresses the current and potential uses of social media in a variety of formal and informal learning contexts. The session will include examples for applying “traditional” best practices for implementing instructionally-enhanced social media applications for collaborative e-Learning.
The discrete location of distribution center is a NP-hard issue and has been studying for many years. Inspired by the phenomenon of symbiosis in natural ecosystems, multi-swarm cooperative particle swarm optimizer (MC...
详细信息
The current state of the world economy has made Software-As-A-Service (SaaS) an appealing concept for organizations with a small budget for IT infrastructure investment. In a SaaS setup, companies subscribe software a...
详细信息
As Mobile Ad hoc Networks (MANETs) are attracting attention for their potential use in several fields such as collaborative computing and multimedia communications, there is an increasing need to minimize the overhead...
详细信息
As Mobile Ad hoc Networks (MANETs) are attracting attention for their potential use in several fields such as collaborative computing and multimedia communications, there is an increasing need to minimize the overhead introduced by routing protocols in the network. In this paper, we analyze the performance of a MANET by simulations, in terms of RREQ, RREP and RERR, considering Random Waypoint Mobility (RWM) model. We consider the cases when all nodes are moving and source and destination nodes are static. We evaluate the performance by measuring the throughput and AODV control packets.
In this paper, we investigate the performance of OLSR and AODV protocols in a VANET crossroad scenario. The mobility patterns of vehicles are generated by means of CAVENET (Cellular Automaton based Vehicular Network) ...
详细信息
In this paper, we investigate the performance of OLSR and AODV protocols in a VANET crossroad scenario. The mobility patterns of vehicles are generated by means of CAVENET (Cellular Automaton based Vehicular Network) and as communication protocol simulator, is used NS3(Network Simulator 3). For the simulations, we used IEEE802.11p standard, TwoRayGroundPropagationLossModel and sent multiple CBR flows over UDP between ten pairs source-destination. We use Packet Delivery Ratio (PDR), throughput and delay as evaluation metrics. We compared the performance of both protocols and the simulation results shows that for big values of transmission rates, OLSR performs better than AODV. For small transmission rates, the delay is less than 0.1sec and both protocols can be used for real time applications such as safety applications. For big values of transmission rate, the delay is higher than 1 sec and these protocols can be used for applications that tolerate this delay such as streaming and entertainment.
As robots are being integrated into our daily lives, it becomes necessary to provide guarantees of safe and provably correct operation. Such guarantees can be provided using automata theoretic task and mission plannin...
详细信息
As robots are being integrated into our daily lives, it becomes necessary to provide guarantees of safe and provably correct operation. Such guarantees can be provided using automata theoretic task and mission planning where the requirements are expressed as temporal logic specifications. However, in real-life scenarios, it is to be expected that not all user task requirements can be realized by the robot. In such cases, the robot must provide feedback to the user on why it cannot accomplish a given task. Moreover, the robot should indicate what tasks it can accomplish which are as “close” as possible to the initial user intent. Unfortunately, the latter problem, which is referred to as minimal specification revision problem, is NP complete. This paper presents an approximation algorithm that can compute good approximations to the minimal revision problem in polynomial time. The experimental study of the algorithm demonstrates that in most problem instances the heuristic algorithm actually returns the optimal solution. Finally, some cases where the algorithm does not return the optimal solution are presented.
The pay-as-you-go economic model of cloud computing leads naturally to an earn-as-you-go profit model for many cloud based services. These applications can benefit from low level analyses for cost optimization and ver...
详细信息
The pay-as-you-go economic model of cloud computing leads naturally to an earn-as-you-go profit model for many cloud based services. These applications can benefit from low level analyses for cost optimization and verification. Testing cloud applications to ensure they meet monetary cost objectives has not been well explored in the current literature. We present a static analysis approach for determining which control flow paths in cloud applications can exceed a cost threshold. We build on tools used in Worst Case Execution Time analysis that provide a tight bound on processing time, and we implement provisions for adding bandwidth, storage, and service costs. Our approach determines the magnitude of cost excess for nodes in an application's call graph so that cloud developers can better understand where to focus their efforts to lower costs (or deem some excesses acceptable based on business case analysis).
暂无评论