In this paper we discuss how to facilitate the process of reflection in Personal Informatics and Quantified Self systems through interactive data visualizations. Four heuristics for the design and evaluation of such s...
详细信息
In this paper, we consider an MMPP/M/1/1 retrial queue where incoming fresh calls arrive at the server according to a Markov modulated Poisson process (MMPP). Upon arrival, an incoming call either occupies the server ...
详细信息
In this paper, we consider an MMPP/M/1/1 retrial queue where incoming fresh calls arrive at the server according to a Markov modulated Poisson process (MMPP). Upon arrival, an incoming call either occupies the server if it is idle or joins a virtual waiting room called orbit if the server is busy. From the orbit, incoming calls retry to occupy the server in an exponentially distributed time and behave the same as a fresh incoming call. After an exponentially distributed idle time, the server makes an outgoing call whose duration is also exponentially distributed but with a different parameter from that of incoming calls. Our contribution is to derive the first order (law of large numbers) and the second order (central lim让 theorem) asymptotics for the distribution of the number of calls in the orb计 under the condition that the retrial rate is extremely low. The asymptotic results are used to obtain the Gaussian approximation for the distribution of the number of calls in the orbit. Our result generalizes earlier results where Poisson input was assumed.
Multi-objective portfolio optimisation is a critical problem researched across various fields of study as it achieves the objective of maximising the expected return while minimising the risk of a given portfolio at t...
详细信息
作者:
Katos, VasiliosPatel, AhmedSchool of Computing
University of Portsmouth Portsmouth United Kingdom School of Computing
Information Systems and Mathematics Centre for Applied Research in Information Systems Kingston University Kingston upon Thames United Kingdom Department of Computer Science
Faculty of Information Science and Technology University Kebangsaan Malaysia Bangi Malaysia
Purpose - This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level. Design/methodology/approach - The methodology is ported...
详细信息
Purpose - This paper aims to propose a tool to help policy makers understand the dynamic relationships between security and privacy on a strategic (macro) level. Design/methodology/approach - The methodology is ported from the discipline of Macroeconomics, and applied to the information security and privacy domain. The methodology adopted is the so-called "cross methodology" which claims ownership of the well-known supply/demand market equilibrium exercise. Findings - Early evaluation reveals that this is a potentially very effective tool in understanding societal behaviour and position towards information security and privacy and therefore makes this a suitable tool for investigating and exploring scenarios that can assist in policy making. Originality/value - Up to date, research on the economics of security and privacy has been primarily focusing on a micro level. The main contribution of this paper is a methodology for investigating privacy and security on a macro level. We believe that our approach in undertaking this research is new and looking at the issues and relationships between security and privacy at a macro level, gives a better understanding of the problems at hand and how to resolve them. Practical implications - The proposed tool may increase the efficiency of policy making and planning as it enables the policy makers on a governmental and strategic level to run scenarios in order to investigate the effect of their decisions (for example, an introduction of a stricter law relating to computer misuse) to the delicate balance of security and privacy.
Background: Treatment for essential tremor (ET) and cortical myoclonus (CM) differs. As their clinical distinction can be difficult, with large inter- and intra-observer variability, there is a need for additional dia...
详细信息
Blind people face diculties when navigating unfamiliar environments. The information displayed on indoor signs and notice boards is of no use to them. In order to assist them with this challenge, we propose a real tim...
详细信息
Bounded Model Checking (BMC) is the problem of checking if a model satisfies a temporal property in paths with bounded length k. Propositional SAT-based BMC is conducted in a gradual manner, by solving a series of SAT...
详细信息
Bounded Model Checking based on SAT methods has recently been introduced as a complementary technique to BDD-based Symbolic Model Checking. The basic idea is to search for a counter ex- ample in executions whose lengt...
详细信息
For a physical system, regardless of time reversal symmetry, a potential function serves also as a Lyapunov function, providing convergence and stability information. In this paper, the converse is constructively prov...
详细信息
For a physical system, regardless of time reversal symmetry, a potential function serves also as a Lyapunov function, providing convergence and stability information. In this paper, the converse is constructively proved that any dynamics with a Lyapunov function has a corresponding physical realization: a friction force, a Lorentz force, and a potential function. Such construction establishes a set of equations with physical meaning for Lyapunov function and suggests new approaches on the significant unsolved problem namely to construct Lyapunov functions for general nonlinear systems. In addition, a connection is found that the Lyapunov equation is a reduced form of a generalized Einstein relation for linear systems, revealing further insights of the construction.
This paper considers smooth convex optimization problems with many functional constraints. To solve this general class of problems we propose a new stochastic perturbed augmented Lagrangian method, called SGDPA, where...
详细信息
暂无评论