The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The deep penetration of mobile phones offers cities the ability to opportunistically monitor citizens’ mobility and use data-driven insights to better plan and manage services. With large scale data on mobility patterns, operators can move away from the costly, mostly survey based, transportation planning processes, to a more data-centric view, that places the instrumented user at the center of development...
Transportation mode inference is an important research direction and has many applications. Existing methods are usually based on fine-grained sampling - collecting position data from mobile devices at high frequency. These methods can achieve high accuracy, but also incur cost and complexity in terms of the computational resource and system implementation. Finally, fine-grained sampling is not always...
One among the most influential and popular data mining methods is the k-Means algorithm for cluster analysis. Techniques for improving the efficiency of k-Means have been largely explored in two main directions. The amount of computation can be significantly reduced by adopting geometrical constraints and an efficient data structure, notably a multidimensional binary search tree (KD-Tree). These techniques...
Clustering is defined as the grouping of similar items in a set, and is an important process within the field of data mining. As the amount of data for various applications continues to increase, in terms of its size and dimensionality, it is necessary to have efficient clustering methods. A popular clustering algorithm is K-Means, which adopts a greedy approach to produce a set of K-clusters with...
BGP allows providers to express complex routing policies preserving high degrees of autonomy. However, unrestricted routing policies can adversely impact routing stability. A key concept to understand the interplay between autonomy and expressiveness on one side, and stability on the other side, is safety under filtering, i.e., guaranteed stability under autonomous usage of route filters. BGP route...
In this study, we report on the utilization of layered substrates for increased performance of fluorescent-based detection schemes. Through optimization of layer thicknesses, we demonstrate that enhancement with respect to commonly used microscope slides is achieved for the collected fluorescence signal.
The traditional relationship between the car, driver, and city can be described as waypoint navigation with additional traffic and maintenance information. The car can receive and store waypoint information, find the shortest route to these waypoints, integrate traffic information, find points-of-interest, and alert the driver of a pre-programmed set of maintenance issues related to the car. Here,...
In service-oriented environments the service discovery mechanisms adopting a key-word based and centralised approach are not able to provide the users' requests with accurate results, nor are any longer able to scale against the increasing number of Web Services provided by service providers. Distributed, semantics-enabled infrastructures for service discovery promise to fulfill these requirements,...
This paper presents a semiautomatic method for the identification of immunohistochemical (IHC) staining in digitized samples. The user trains the system by selecting on a sample image some typical positive stained regions that will be used as a reference for the construction of a distance metric. In this learning process, the global optimum is obtained by induction employing higher polynomial terms...
The increasing number of Web Services provided by several service providers demands for effective, scalable and accurate mechanisms to search and select the most appropriate service, fulfilling some user requirements. Distributed, semantics-enabled infrastructures for service discovery could satisfy these requirements, even if the promise of dynamic selection and automated integration of Web services...
A constrained penalty function method for exploratory adaptive-critic neural network (NN) control is presented. While constrained approximate dynamic programming has been effective to guarantee closed-loop system performance and stability objectives, in the presence of a change in the plant dynamics it may not have the necessary plasticity to explore and fully adapt to the new behaviors of the plant,...
Internet service providers can enforce a fine grained control of interdomain routing by cleverly configuring the Border Gateway Protocol. However, the price to pay for the flexibility of BGP is the lack of convergence guarantees. Network protocol design literature introduced several sufficient conditions that routing policies should satisfy to guarantee convergence. However, to our knowledge, none...
This work proposes a novel algorithm for energy-efficient and reliable spectrum sensing in a cognitive network. The algorithm relies on cooperation between secondary devices, that organize themselves in clusters defined according to both sensing reliability and energy efficiency. The proposed algorithm is compared by means of computer simulations with a simpler, non cluster-based cooperative sensing...
A constrained-backpropagation (CPROP) training technique is presented to solve partial differential equations (PDEs). The technique is based on constrained optimization and minimizes an error function subject to a set of equality constraints, provided by the boundary conditions of the differential problem. As a result, sigmoidal neural networks can be trained to approximate the solution of PDEs avoiding...
The effectiveness and the efficiency of functional ATPGs based on deterministic strategies is influenced by the computational model adopted to represent the design under test. In this context the extended finite state machine (EFSM) is a valuable model which reduces the risk of state explosion preserving relevant features of more traditional FSMs. This paper. defines a particular variant of EFSMs...
Cryptographic devices can be subject to side-channel attacks that consist in retrieving secret data by observing physical properties of the device. Among those attacks, differential power analysis (DPA) has proven to be very effective and easy to perform. Several countermeasures have been proposed in the literature and one of the most promising is based on power balanced design. There are still not...
Systems Engineering often involves computer modelling the behaviour of proposed systems and their components. Where a component is human, fallibility must be modelled by a stochastic agent. The identification of a model of decision-making over quantifiable options is investigated using the game-domain of Chess. Bayesian methods are used to infer the distribution of players' skill levels from the moves...
Recent works on modeling the Internet topology have highlighted how the complexity of relationships between Autonomous Systems (ASes) can not be oversimplified without sacrificing accuracy in capturing route selection. Such a shortcoming can mislead the understanding, hence the prediction, of the BGP (Border Gateway Protocol) behavior. In particular, models that assume an AS to be an atomic entity...
In this paper we present novel results regarding the modeling of the SAR imaging process of natural scenes. The proposed model represents the extension to the two-dimensional case of the model previously proposed by some of the authors for the case of a one-dimensional fractal profile. Assuming a fractional Brownian model (fBm) for the observed surface and under a small slope hypothesis, we evaluate...
Vehicular networks require secure communication, especially for safety applications. A public key infrastructure using a Combinatorial Certificate Scheme was implemented in the US Vehicle Infrastructure Integration (VII) Proof-of- Concept (PoC) trial to secure V2V communication and preserve vehicle privacy. This paper analyzes the privacy and scalability of the Combinatorial Certificate approach for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.