In this paper, we introduce the notion of "weight" to task's capability, and describe the use of case-based learning and reinforcement learning in a coalition formation model when games are repeated. Bas...
详细信息
ISBN:
(纸本)9781424472369
In this paper, we introduce the notion of "weight" to task's capability, and describe the use of case-based learning and reinforcement learning in a coalition formation model when games are repeated. Based on the the notion "weight" we introduce, a weight-based coalition formation algorithm is proposed, but this algorithm can't always generate good coalitions, to supplement this, an randomized weight-based coalition formation algorithm is introduced. However, deciding when to use which algorithm is not such an easy thing, so a notion of "degree of similarity" is defined, through learning, an optimal degree of similarity can be attained to solve the above problem. In a word, we handle the coalition formation problem in a more of machine learning and data driven perspective.
This paper considers the problem of formation control for mobile robots which are subject to input constraints. The control strategy based on virtual robot tracking is proposed, which leads to a compact controller for...
详细信息
This paper considers the problem of formation control for mobile robots which are subject to input constraints. The control strategy based on virtual robot tracking is proposed, which leads to a compact controller form in terms of two feedback parameters by Lyapunov method. The introduced elliptic approximation of input constraints brings much convenience to obtain suitable feedback parameters. It is show that the presented sufficient condition guarantees the existence of feasible feedback parameters. Moreover, guidelines for the selection of feedback parameters are provided with geometric analysis. Simulation results verify the effectiveness of the proposed control strategy.
The open, dynamic and uncertain internet platform requires software systems running on it should be able to probe the changes of their running environments and adapt themselves accordingly. The Internetware paradigm a...
详细信息
At present, most Ad Hoc grid task scheduling algorithms ignore the impact of trust mechanism, resulting in the potential dangerous in the real scheduling. In this paper, the trust model is defined, which satisfies the...
详细信息
Recent pervasive systems are designed to be context-aware so that they are able to adapt to continual changes of their environments. Rule-based adaptation, which is commonly adopted by these applications, introduces n...
详细信息
Combinatorial testing aims to detect interaction faults, which are triggered by interaction among parameters in system, by covering some specific combinations of parametric values. Most works about combinatorial testi...
详细信息
In this paper we consider how to efficiently identify tags on the moving conveyor. Considering conditions like the path loss and multi-path effect in realistic settings, we first propose a probabilistic model for RFID...
详细信息
Generally, it is often a challenging issue to develop a QoS-optimal service composition schema from vast amount of services. In view of this challenge, an automatic service composition method is proposed, in this pape...
详细信息
RFID technology is increasingly being deployed in ubiquitous computing environments for object tracking and localization. Existing tracking architecture usually assumes the use of a trusted server which is invulnerabl...
详细信息
Clusters provide powerful computing performance is at cost of huge energy consumption. Scheduling a parallel application with a set of precedence-constrained tasks on cluster is challenging because of high communicati...
详细信息
暂无评论