The tOWL language is a temporal web ontology language based on OWL-DL without nominals. The language enables the representation of time and time-related aspects, such as state transitions. The design choices of the la...
详细信息
We study the asymptotic throughput for a large-scale wireless ad hoc network consisting of n nodes under the generalized physical model. We directly compute the throughput of multicast sessions to unify the unicast an...
We study the asymptotic throughput for a large-scale wireless ad hoc network consisting of n nodes under the generalized physical model. We directly compute the throughput of multicast sessions to unify the unicast and broadcast throughputs. We design two multicast schemes based on the so-called ordinary arterial road system and parallel arterial road system, respectively. Correspondingly, we derive the achievable multicast throughput by taking account of all possible cases of n
s
= ω(1) and 1 ≤ n
d
≤ n − 1, rather than only the cases of
$$n_s=\Uptheta(n)$$
as in most related works, where n
s
and n
d
denote the number of sessions and the number of destinations of each session, respectively. Furthermore, we consider the network with a general node density
$$\lambda \in [1,n]$$
, while the models in most related works are either random dense network (RDN) or random extended network (REN) where the density is λ = n and λ = 1, respectively, which further enhances the generality of this work. Particularly, for the special case of our results by letting λ = 1 and
$$n_s=\Uptheta(n)$$
, we show that for some regimes of n
d
, the multicast throughputs achieved by our schemes are better than those derived by the well-known percolation-based schemes.
An eavesdropper(Eve)can exploit all the imperfections of a practical quantum key distribution(QKD)system to obtain some information about the secret key,no matter whether these imperfections are from the physical laye...
详细信息
An eavesdropper(Eve)can exploit all the imperfections of a practical quantum key distribution(QKD)system to obtain some information about the secret key,no matter whether these imperfections are from the physical layer or from the post-processing *** propose a possible attack on a passive detection QKD system based on the imperfection from the software *** analysis shows that Eve can obtain all the information about the key without being discovered.
In a parallel system, nodes communicate with each other by exchanging messages. Different topologies exist for arranging processors in a network based on the architecture of the network;or based on the fact that a net...
详细信息
This paper compares three techniques for Arabic text classification;these techniques are Support Vector Machine (SVM) with Sequential Minimal Optimization (SMO), Naïve Bayesian (NB), and J48. The main objective o...
详细信息
Learning Object (LO) is one of the main research topics in the e-learning community in the recent years, and most researchers pay attention to the issue of Learning Object Reusability. The most obvious motivation is t...
详细信息
Least association rules are corresponded to the rarity or irregularity relationship among itemset in database. Mining these rules is very difficult and rarely focused since it always involves with infrequent and excep...
详细信息
Least association rules are corresponded to the rarity or irregularity relationship among itemset in database. Mining these rules is very difficult and rarely focused since it always involves with infrequent and exceptional cases. In certain medical data, detecting these rules is very critical and most valuable. However, mathematical formulation and evaluation of the new proposed measurement are not really impressive. Therefore, in this paper we applied our novel measurement called Critical Relative Support (CRS) to mine the critical least association rules from medical dataset. We also employed our scalable algorithm called Significant Least Pattern Growth algorithm (SLP-Growth) to mine the respective association rules. Experiment with two benchmarked medical datasets, Breast Cancer and Cardiac Single Proton Emission Computed Tomography (SPECT) Images proves that CRS can be used to detect to the pertinent rules and thus verify its scalability.
Lack of hearing ability hinders deaf children from mastering grammar in language studies. Unfortunately, such software targeting Malay language is limited. This paper attempts to generate new approach in handling such...
详细信息
Rendering of volume caustics in participating media is often expensive, even with different acceleration approaches. Basic volume photon tracing is used to render such effects, but rather slow due to its massive quant...
详细信息
The technology of business process management is being more widely used, and there are more and more business process models. In this demonstration, we show how to query a large number of models efficiently with Beehi...
详细信息
The technology of business process management is being more widely used, and there are more and more business process models. In this demonstration, we show how to query a large number of models efficiently with BeehiveZ. Four types of queries are all supported in BeehiveZ, i.e. exact query based on structure, similarity query based on structure, exact query based on behavior, similarity query based on behavior. BeehiveZ provides different indexes to facilitate the efficient query processing of different types of queries. To make BeehiveZ more applicable, label similarity is considered.
暂无评论