The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
PC-SVM is a new developed support vector machine classifier with probabilistic constrains which presence of samples probability in each class is determined based on a distribution function. The presence of noise causes incorrect calculation of support vectors thereupon margin can not be maximized. In the Pc-SVM, constraints boundaries and constraints occurrence have probability density functions which...
What is a cloud application precisely? In this paper, we formulate a computing cloud as a kind of graph, a computing resource such as services or intellectual property access rights as an attribute of a graph node, and the use of a resource as a predicate on an edge of the graph. We also propose to model cloud computation semantically as a set of paths in a subgraph of the cloud such that every edge...
Reduction of Single Input Single Output (SISO) discrete systems into Reduced Order Model (ROM), using a conventional and a bio-inspired evolutionary technique is presented in this paper. In the conventional technique, mixed advantages of Modified Cauer Form (MCF) and differentiation are used. In this method, the original discrete system is first converted into equivalent continuous system by applying...
We propose a model for deterministic distributed function computation by a network of identical and anonymous nodes, with bounded computation and storage capabilities that do not scale with the network size. Our goal is to characterize the class of functions that can be computed within this model. In our main result, we exhibit a class of non-computable functions, and prove that every function outside...
We study supermodular games on graphs as a benchmark model of cooperation in networked systems. In our model, each agent's payoff is a function of the aggregate action of its neighbors and it exhibits strategic complementarity. We study the largest Nash equilibrium which, in turn, is the Pareto optimal equilibrium in the presence of positive externalities. We show that the action of a node in the...
Malicious softwares or malwares for short have become a major security threat. While originating in criminal behavior, their impact are also influenced by the decisions of legitimate end users. Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arising from the presence of network...
We consider the distributed function computation problem where the sink computes some function of the data split among N correlated informants, in asymmetric communication scenarios. The distributed function computation problem is addressed as a generalization of distributed source coding (DSC) problem. We are interested in computing the minimum number of informant bits required, in the worst-case,...
The natural resources management area is substantial to the development of the all countries, because the resources are more scarce and the number of people bigger. For these reasons, they are more difficult to manage. In this way, find good techniques to learn how to treat with these resources in a sustainable way is an important activity of sciences. Specifically in computer science, several works...
In this paper, we proposed a method to transform the workflow processes into CCS, and the workflow process is described in activity network charts. For the first, we used CCS to describe the six basic logical relations of the workflow model, and then based on the basic expressions, we illustrate how to transform the whole workflow model to CCS process expressions.We provide the exact formalization...
We propose a general survivability quantification framework which is applicable to a wide range of information system architectures and applications. We show how this framework can be used to derive survivability measures based on different definitions and extend it to other measures not covered by current definitions which can provide helpful information for better understanding of system steady...
By communicating and information exchange, agents can fulfill goals of multi-agent systems. Different communication languages and protocols have been proposed for agents. These languages are designed to transfer high level data and donpsilat have appropriate efficiency to send sensing. hearing and visual information in real environments. In this paper a model to exchange such kind of data in an efficient...
Web has already become the richest information resource of the world. Web sources are open, dynamic, and autonomous. Evaluating and selecting high quality Web source is a key for the success of Web-based applications. Currently, most of the web source evaluation and selection are performed by Web experts. However, there are too many Web sources in any field, this process has proved to be very time...
Trust models like Beth, Josang and EigenRep evaluated trust degree by the history of interactions or the reputations, and some other learners brought fuzzy theory, cloud model into the researches of trust management. All of these models based on the trusteepsilas outer information. However it is more reasonable to get the evaluations by both the outer information and the inner attributes. Aiming this...
Peer-to-peer (P2P) networks are vulnerable to Distributed Denial-of-Service (DDoS) attacks, which cause invalid packets to be flooded through the P2P network, preventing valid packets from being delivered. This causes a disruption of the services provided by the P2P network. Since, anonymity and lack of centralized control/censorship are the salient features of P2P networks; it often encourages malicious...
The Gnutella protocol requires peers to broadcast messages to their neighbors when they search files. The message passing generates a lot of traffic in the network, which degrades the quality of service. We propose the new method to optimize the speed of search and to improve the quality of service in a Gnutella based peer-to-peer environment with using semantic routing and priority of nodes. Once...
In traditional ways, the quality and schedule of Web-based information publishing system development cannot be guaranteed due to the rapid change of requirement. In this paper, the requirement of system is translated into information through the requirement manage model, document of system can be accomplished automatically. This model customizes information publishing neatly, relieves the developers...
The device failure must be taken into account in the nano-scale design. This paper presents the probabilistic logic model to model the probabilistic behavior of a nanoscale adder. The analysis shows that the device probability distribution highly depends on the system structures and other performance parameters.
Outlier detection over data streams has attracted attention for many emerging applications, such as network intrusion detection, web click stream and aircraft health anomaly detection. Since the data stream is likely to change over time, it is important to be able to modify the outlier detection model appropriately with the evolution of the stream. Most existing approaches were using incremental or...
Multicore processors promise continued hardware performance improvements even as single-core performance flattens out. However they also enable increasingly complex application software that threatens to obfuscate application-level performance. This paper applies operational analysis to the problem of understanding and predicting application-level performance in parallel servers. We present operational...
BitTorrent (BT) has become an extremely popular and successful peer-to-peer (P2P) file sharing system. Although empirical evidence suggests that most nodes participate in multiple torrents, surprisingly little research literature exists on this topic. In this paper we focus on a multi-torrent system and specifically on the questions of (a) what incentives could be provided for nodes to contribute...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.