Cascading failures often occur in congested networks such as the Internet. A cascading failure can be described as a three-phase process: generation, diffusion, and dissipation of the congestion. In this account, we ...
详细信息
Cascading failures often occur in congested networks such as the Internet. A cascading failure can be described as a three-phase process: generation, diffusion, and dissipation of the congestion. In this account, we present a function that represents the extent of congestion on a given node. This approach is different from existing fimctions based on betweenness centrality. By introducing the concept of 'delay time', we designate an intergradation between permanent removal and nonremoval. We also construct an evaluation fimction of network efficiency, based on congestion, which measures the damage caused by cascading failures. Finally, we investigate the effects of network structure and size, delay time, processing ability and packet generation speed on congestion propagation. Also, we uncover the relationship between the cascade dynamics and some properties of the network such as structure and size.
In this paper, we present a new regularization classification method based on extreme learning machine for within network node classification problem. In particular, we define a new objective function, which contains ...
详细信息
With the development of high-throughput microarray chip technology, there are a large number of microarray expression data, which have few samples compared to the genes of high dimensions. And in recent years, more an...
详细信息
We study the Nadaraya-Watson estimators for the drift function of two-sided reflected stochastic differential *** estimates,based on either the continuously observed process or the discretely observed process,are *** ...
详细信息
We study the Nadaraya-Watson estimators for the drift function of two-sided reflected stochastic differential *** estimates,based on either the continuously observed process or the discretely observed process,are *** certain conditions,we prove the strong consistency and the asymptotic normality of the two *** method is also suitable for one-sided reflected stochastic differential *** results demonstrate that the performance of our estimator is superior to that of the estimator proposed by Cholaquidis et al.(Stat Sin,2021,31:29-51).Several real data sets of the currency exchange rate are used to illustrate our proposed methodology.
Satisfiability problem(SAT) is a central problem in artificial intelligence due to its computational complexity and usefulness in industrial applications. Stochastic local search(SLS) algorithms are powerful to solve ...
详细信息
Satisfiability problem(SAT) is a central problem in artificial intelligence due to its computational complexity and usefulness in industrial applications. Stochastic local search(SLS) algorithms are powerful to solve hard instances of satisfiability problems, among which CScore SAT is proposed for solving SAT instances with long clauses by using greedy mode and diversification mode. In this paper, we present a randomized variable selection strategy to improve efficiency of the diversification mode, and thus propose a new SLS *** perform a number of experiments to evaluate the new algorithm comparing with the recently proposed algorithms, and show that our algorithm is comparative with others for solving random instances near the phase transition threshold.
Special physical characters and limited resources in tags make existing RFID systems being confronted with many security and privacy concerns. In this paper, a RFID authentication protocol is proposed, with a novel sc...
详细信息
Special physical characters and limited resources in tags make existing RFID systems being confronted with many security and privacy concerns. In this paper, a RFID authentication protocol is proposed, with a novel scheme called index inner table used in the reader. Index inner table may efficiently utilize calculation capacity and storage space of the reader to construct a filter which can sift authentication applications from tags, thus, it could alleviate workload of the backend server and resist replay attack from an adversary. The structure, filter algorithm, update and sorting algorithm, eraser algorithm of index inner table would be introduced detailedly in this paper. In addition, this protocol is particularly suitable for the low-cost RFID systems;the security and performance of this protocol are analyzed as well.
Real-time three-dimensional visualization for seismic data is difficult when seismic data are large-scale and usually exceed the limitation of host memories. This paper proposed a dynamic caching framework based on OC...
详细信息
Model-based diagnosis(MBD)with multiple observations shows its significance in identifying fault *** existing approaches for MBD with multiple observations use observations which is inconsistent with the prediction of...
详细信息
Model-based diagnosis(MBD)with multiple observations shows its significance in identifying fault *** existing approaches for MBD with multiple observations use observations which is inconsistent with the prediction of the *** this paper,we proposed a novel diagnosis approach,namely,the Diagnosis with Different Observations(DiagDO),to exploit the diagnosis when given a set of pseudo normal observations and a set of abnormal *** ideas are proposed in this ***,for each pseudo normal observation,we propagate the value of system inputs and gain fanin-free edges to shrink the size of possible faulty ***,for each abnormal observation,we utilize filtered nodes to seek surely normal ***,we encode all the surely normal components and parts of dominated components into hard clauses and compute diagnosis using the MaxSAT solver and MCS *** tests on the ISCAS'85 and ITC'99 benchmarks show that our approach performs better than the state-of-the-art algorithms.
The Diameter protocol is recommended by IETF as AAA (Authentication, Authorization and Accounting) protocol criterion for the next generation network, Because the IPv6 protocol will be widely applied in the intending ...
详细信息
Automatically analyzing interactions from video has gained much attention in recent years. Here a novel method has been proposed for analyzing interactions between two agents based on the tra jectories. Previous works...
详细信息
Automatically analyzing interactions from video has gained much attention in recent years. Here a novel method has been proposed for analyzing interactions between two agents based on the tra jectories. Previous works related to this topic are methods based on features, since they only extract features from objects. A method based on qualitative spatio-temporal relations is adopted which utilizes knowledge of the model(qualitative spatio-temporal relation calculi) instead of the original tra jectory information. Based on the previous qualitative spatio-temporal relation works, such as Qualitative tra jectory calculus(QTC), some new calculi are now proposed for long term and complex interactions. By the experiments, the results showed that our proposed calculi are very useful for representing interactions and improved the interaction learning more effectively.
暂无评论