The genetic algorithm (GA) often suffers from the premature convergence because of the loss of population diversity at an early stage of searching. This paper proposes a steep thermodynamical evolutionary algorithm (S...
详细信息
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer's identity. Hence, there exists an inhere...
详细信息
With in skeleton based deformation, two issues are waiting for investigation, large angle rotation and artifacts near joint regions. In this paper we propose rotation angle decomposition and detail preserving method t...
详细信息
In this paper, we study the following minimum rooted star cover problem: given a complete graph G = (V, E) with a length function l : E &rarr + that satisfies the triangle inequality, a designated root vertex r ∈...
详细信息
ISBN:
(纸本)3540725032
In this paper, we study the following minimum rooted star cover problem: given a complete graph G = (V, E) with a length function l : E &rarr + that satisfies the triangle inequality, a designated root vertex r ∈ V, and a length bound D, the objective is to find a minimum cardinality set of rooted stars, that covers all vertices in V such that the length of each rooted star is at most D, where a rooted star is a subset of E having a common center s S V and containing the edge (r, s). This problem is NP-complete and we present a constant ratio approximation algorithm for this problem. Springer-Verlag Berlin Heidelberg 2007.
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonym...
详细信息
ISBN:
(纸本)9783540725893
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult. In this paper, we identify access control requirements and propose a trust based access control framework for P2P file-sharing systems. The model integrates aspects of trust and recommendation, fairness based participation schemes and access control schemes.
In order to improve stimulus-response compatibility of touchpad in pen-based user interface, we present the tilt cursor, i.e. a cursor dynamically reshapes itself to providing the 3D orientation cue of pen. We also pr...
详细信息
Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energy of sensor nodes while meeting the requ...
详细信息
ISBN:
(纸本)9781424403523
Data gathering is a major function of many applications in wireless sensor networks (WSNs). The most important issue in designing a data gathering algorithm is how to save energy of sensor nodes while meeting the requirement of applications/users such as sensing area coverage. In this paper, we propose a novel hierarchical clustering protocol for long-lived sensor network. EAP achieves a good performance in terms of lifetime by minimizing energy consumption for in-network communications and balancing the energy load among all nodes. EAP introduces a new clustering parameter for cluster head election, which can better handle the heterogeneous energy capacities. Furthermore, it also introduces a simple but efficient approach, namely intra-cluster coverage to cope with the area coverage problem. We evaluate the performance of the proposed protocol using a simple temperature sensing application. Simulation results show that our protocol significantly outperforms LEACH and HEED in terms of network lifetime and the amount of data gathered.
In this paper, we suggest an adaptive watermarking method to improve both transparence and robustness of quantization index modulation (QIM) scheme. inst.ad of a fixed quantization step size, we apply a step size adap...
详细信息
Support vector machine (SVM) has been studied and applied extensively for its high accuracy, but it must construct SVM decision tree to classify sample sets with multiclass for it just be applicable for binary classif...
详细信息
ISBN:
(纸本)7900719229
Support vector machine (SVM) has been studied and applied extensively for its high accuracy, but it must construct SVM decision tree to classify sample sets with multiclass for it just be applicable for binary classification and solve a quadratic programming problem to gain optimal hyperplane either in sample spaces or in feature spaces;Alternative covering algorithm which designs neutral networks with spherical domains has the advantages of fast performance, some hard solving problems have been solved using this algorithm. In this paper, a new kind of structural learning algorithm which combining covering design algorithm, fuzzy set and SVM is put forward, inst.nces show that this kind of networks has the virtue of both covering design algorithm and SVM.
With the development of mirror sites, parallel downloading, which can decrease download latency, is becoming more and more popular. Dynamic parallel downloading can be adapted according to the fluctuation of network b...
详细信息
暂无评论