This paper, based on the existing LEACH routing algorithm, proposes a novel adaptive zone-crossed and virtual node for multi-hop routing algorithm for large-scale wireless sensor networks. At first, we introduce the c...
详细信息
This paper, based on the existing LEACH routing algorithm, proposes a novel adaptive zone-crossed and virtual node for multi-hop routing algorithm for large-scale wireless sensor networks. At first, we introduce the concepts of “zone” and “virtual node”. On this basis, an equilibrium energy routing algorithm is proposed. The purpose is to optimize multi-hop routing by shortening distance. Our simulation experiment demonstrates that, compared to the LEACH protocol, this new solution could reduce the energy consumption of cluster heads significantly, prolong the lifetime of networks and distribute dead nodes more uniformly.
Continuous time Markov chains (CTMCs) have been used in real-time dependability and security analysis. However, existing approaches assume that the system is fully observable to a system attacker, which is not feasibl...
详细信息
Interactive population-based incremental learning (IPBIL) is an effective method to solve optimization problems with implicit performance indices. It can significantly reduce user fatigue compared with interactive evo...
详细信息
ISBN:
(纸本)9781424463473
Interactive population-based incremental learning (IPBIL) is an effective method to solve optimization problems with implicit performance indices. It can significantly reduce user fatigue compared with interactive evolutionary computation (IEC). However,each run of IPBIL can only find one solution or some similar solutions. Thus it is not suitable for multimodal optimization problems with implicit performance indices. To solve this problem,we propose an IPBIL with multiple probability vectors (IPBIL-MPV) in this work. The key idea is to utilize multiple probability vectors to catch different search directions and thus find more than one solutions. We perform a subjective experiment in which IPBIL-MPV is applied to a fashion design problem. The experimental results show that IPBIL-MPV can find several distinct solutions in a run. Thus it is an effective method to solve multimodal optimization problems with implicit performance indices.
Internet Data Centers (IDC) emerge as a major network service platform to converge Internet related services and applications to one location, managing servers, networks, together with valuable and sensitive data of m...
详细信息
Monitoring and fault tolerance are important approaches to give high confidence that long-running online software systems run correctly. But these approaches will certainly cause high overhead cost, i.e. the loss of e...
详细信息
Monitoring and fault tolerance are important approaches to give high confidence that long-running online software systems run correctly. But these approaches will certainly cause high overhead cost, i.e. the loss of efficiency. Multi-core platforms can make such cost acceptable because of the advantage of the parallel performance. For allowing ordinary software developers without any knowledge of multi-core platforms to handle such programming tasks more efficiently, we propose an approach to enable multi-core based monitoring and fault tolerance in C++/Java.
Data grids provide the data-intensive applications with a large virtual storage framework. We use a reputation-based trust aggregation approach for data providers to quantitatively predict and calculate whether or not...
详细信息
Data grids provide the data-intensive applications with a large virtual storage framework. We use a reputation-based trust aggregation approach for data providers to quantitatively predict and calculate whether or not they are reliable and credible. In the same time, adaptable trust service is increasingly important for applications running on data grids. However, existing systems are unable to satisfy the flexible trust needs of complex data-intensive applications. This paper introduced a novel approach and proposed a quality of reputation-based trust framework for storage resources in data grids (QRTF). QRTF leverages the manager to dynamically control quality of trust for application requests, thereby achieving good tradeoffs between reputation-based trust service and system performance. Experimental results based on a simulated grid with storage resources show that the proposed framework is capable of significantly improving trust service quality and guaranteeing desired response time.
In this paper, we introduce the notion of "weight" to task's capability, and describe the use of case-based learning and reinforcement learning in a coalition formation model when games are repeated. Bas...
详细信息
ISBN:
(纸本)9781424472352
In this paper, we introduce the notion of "weight" to task's capability, and describe the use of case-based learning and reinforcement learning in a coalition formation model when games are repeated. Based on the the notion "weight" we introduce, a weight-based coalition formation algorithm is proposed, but this algorithm can't always generate good coalitions, to supplement this, an randomized weight-based coalition formation algorithm is introduced. However, deciding when to use which algorithm is not such an easy thing, so a notion of "degree of similarity" is defined, through learning, an optimal degree of similarity can be attained to solve the above problem. In a word, we handle the coalition formation problem in a more of machine learning and data driven perspective.
This paper proposes an emotional harmony composition system using a series of predefined rules and interactive genetic algorithm. Two kinds of rules are defined: One is harmony composition rules used for composing har...
详细信息
This paper proposes an emotional harmony composition system using a series of predefined rules and interactive genetic algorithm. Two kinds of rules are defined: One is harmony composition rules used for composing harmony and the other is harmony emotion rules which may indicate the mapping between harmonic elements and a specific emotion of either happiness or sadness. Interactive genetic algorithm is applied to incorporate users' subjective perception in the generated harmony. Both subjective and objective experiments are conducted to prove the effectiveness of our approach.
RFID technology is increasingly being deployed in ubiquitous computing environments for object tracking and localization. Existing tracking architecture usually assumes the use of a trusted server which is invulnerabl...
详细信息
RFID technology is increasingly being deployed in ubiquitous computing environments for object tracking and localization. Existing tracking architecture usually assumes the use of a trusted server which is invulnerable to compromise by internal and external adversaries. However, maintaining such a trusted server is unlikely in the real world. In this paper, we consider the problem of adding privacy protection to object tracking systems built upon passive RFID tags, without relying on a trusted server assumption. Our protocol continues to protect user privacy in the event of partial compromise of a server.
MANET (Mobile ad hoc network) is vulnerable to security attack due to its characteristics such as open network environment, lack of centralized control, dynamic topology, and so on, while traditional security mechanis...
详细信息
暂无评论