Search results for "Abstract"

showing 10 items of 1959 documents

Feasibility of finite and infinite paths in data dependent programs

2005

This paper considers the feasibility of finite and infinite paths in programs in two simple programming languages. The language LBASE allows to express the dependencies of real time systems on integer data, the language LTIM can model quantitative timing constraints in r.t.s. specifications. It is proven that the problem of whether a given LBASE or LTIM program has an infinite feasible path (i.e. whether it can exhibit an infinite behaviour) is decidable. The possibilities to characterise the sets of all feasible finite and infinite paths in LBASE and LTIM programs are also discussed. The infinite feasible path existence problem is proven decidable also for the language LTIBA which has both…

Mathematical optimizationProgramming languageReachability problemSimple (abstract algebra)Computer sciencePath (graph theory)Computer Science::Programming Languagescomputer.software_genrecomputerData dependentInteger (computer science)Decidability
researchProduct

The branch set of a quasiregular mapping between metric manifolds

2016

Abstract In this note, we announce some new results on quantitative countable porosity of the branch set of a quasiregular mapping in very general metric spaces. As applications, we solve a recent conjecture of Fassler et al., an open problem of Heinonen–Rickman, and an open question of Heinonen–Semmes.

Discrete mathematicsConjectureMathematics::Complex VariablesOpen problem010102 general mathematicsMathematical analysisGeneral Medicine01 natural sciences010101 applied mathematicsSet (abstract data type)Metric spaceMetric (mathematics)Mathematics::Metric GeometryCountable set0101 mathematicsMathematicsComptes Rendus Mathematique
researchProduct

Graphical models for estimating network determinants of multi-destination trips in Sicily

2017

Abstract This paper proposes a two-step approach for analysing the main determinants of multi-destination trip behaviour. It is based on a combination of graphical models and of a multinomial logistic regression model; the aim is to analyse direct and indirect effects of a wide set of tourist- and trip-related characteristics on multi-destination trip behaviour. Empirical data have been derived from a frontier survey of approximately 4000 incoming tourists in Sicily (Italy) at the end of their trip. Results suggest that multi-destination trips depend directly on the length of stay, the number of previous visits and motivation for the trip, and only indirectly on the interview month, travel …

Empirical dataTourist mobility05 social sciencesAdvertisingCountry of originSet (abstract data type)FrontierGeographyMultinomial logistic regression modelTourism Leisure and Hospitality Management0502 economics and businessEconometricsTRIPS architecture050211 marketingGraphical modelSettore SECS-S/05 - Statistica SocialeSettore SECS-S/01 - StatisticaSicily050212 sport leisure & tourismTourismLog-linear graphical modelTourist behaviour
researchProduct

Binary jumbled string matching for highly run-length compressible texts

2012

The Binary Jumbled String Matching problem is defined as: Given a string $s$ over $\{a,b\}$ of length $n$ and a query $(x,y)$, with $x,y$ non-negative integers, decide whether $s$ has a substring $t$ with exactly $x$ $a$'s and $y$ $b$'s. Previous solutions created an index of size O(n) in a pre-processing step, which was then used to answer queries in constant time. The fastest algorithms for construction of this index have running time $O(n^2/\log n)$ [Burcsi et al., FUN 2010; Moosa and Rahman, IPL 2010], or $O(n^2/\log^2 n)$ in the word-RAM model [Moosa and Rahman, JDA 2012]. We propose an index constructed directly from the run-length encoding of $s$. The construction time of our index i…

FOS: Computer and information sciencesString algorithmsStructure (category theory)Binary numberG.2.1Data_CODINGANDINFORMATIONTHEORY0102 computer and information sciences02 engineering and technologyString searching algorithm01 natural sciencesComputer Science - Information RetrievalTheoretical Computer ScienceCombinatoricsdata structuresSimple (abstract algebra)Computer Science - Data Structures and AlgorithmsString algorithms; jumbled pattern matching; prefix normal form; data structures0202 electrical engineering electronic engineering information engineeringParikh vectorData Structures and Algorithms (cs.DS)Run-length encodingMathematics68W32 68P05 68P20String (computer science)prefix normal formSubstringComputer Science Applicationsjumbled pattern matching010201 computation theory & mathematicsData structureSignal ProcessingRun-length encoding020201 artificial intelligence & image processingConstant (mathematics)Information Retrieval (cs.IR)Information SystemsInformation Processing Letters
researchProduct

A spiking network for body size learning inspired by the fruit fly

2013

The concept of peripersonal space is an interesting research topics for psychologists, neurobiologists and for robotic applications. A living being can learn the representation of its own body to take the correct behavioral decision when interacting with the world. To transfer these important learning mechanisms on bio-robots, simple and efficient solutions can be found in the insect world. In this paper a neural-based model for body-size learning is proposed taking into account the results obtained in experiments with fruit flies. Simulations and experimental results on a roving platform are reported and compared with the biological counterpart.

Artificial neural networkbusiness.industryComputer scienceComputational modelMobile robotBiologically inspired modelsSpace (commercial competition)Body sizeMachine learningcomputer.software_genreDrosophila melanogasterSimple (abstract algebra)Biologically inspired models; Drosophila melanogaster; Computational modelArtificial intelligenceBiomimeticsbusinessRepresentation (mathematics)computer
researchProduct

Constrained Role Mining

2013

Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization. Usually the process of (automatically) defining the roles in a bottom up way, starting from the permissions assigned to each user, is called {\it role mining}. In literature, the role mining problem has been formally analyzed and several techniques have been proposed in order to obtain a set of valid roles. Recently, the problem of defining different kind of constraints on the number and the size of the roles included in the resu…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityProcess (engineering)business.industryComputer scienceDistributed computingVertex coverAccess controlTop-down and bottom-up designEnterprise information security architecturecomputer.software_genreSet (abstract data type)Order (exchange)Role-based access controlData miningbusinessCryptography and Security (cs.CR)computer
researchProduct

Accelerometry - Simple, but challenging

2017

accelerometersComputer sciencephysical activityPhysical Therapy Sports Therapy and RehabilitationAccelerometerMachine learningcomputer.software_genre03 medical and health sciences0302 clinical medicineSimple (abstract algebra)AccelerometryHumansOrthopedics and Sports Medicine030212 general & internal medicineta315Exercisekiihtyvyysmittaaminenbusiness.industryta3141030229 sport sciencesArtificial intelligencemeasurementsbusinesscomputerfyysinen aktiivisuusScandinavian Journal of Medicine and Science in Sports
researchProduct

Attempt to calculation of delayed neutron emission probabilities using simple statistical model considerations

1977

Delayed neutron emission probabilities,P n , have been calculated using usual nuclear statistical model considerations. The influence of the incident parameters on the calculatedP n -values is discussed. The observed systematic deviation from the experimental neutron emission probabilities may be explained by the persistence of nuclear structure effects not contained in a simple statistical model.

Nuclear physicsPhysicsNuclear and High Energy PhysicsSimple (abstract algebra)Neutron emissionAstrophysics::High Energy Astrophysical PhenomenaNuclear TheorySystematic deviationNuclear structureNuclear fusionStatistical modelNuclear ExperimentDelayed neutronZeitschrift f�r Physik A: Atoms and Nuclei
researchProduct

M-bornologies on L-valued Sets

2017

We develop an approach to the concept of bornology in the framework of many-valued mathematical structures. It is based on the introduced concept of an M-bornology on an L-valued set (X, E), or an LM-bornology for short; here L is an iccl-monoid, M is a completely distributive lattice and \(E: X\times X \rightarrow L\) is an L-valued equality on the set X. We develop the basics of the theory of LM-bornological spaces and initiate the study of the category of LM-bornological spaces and appropriately defined bounded “mappings” of such spaces.

Mathematics::Functional AnalysisPure mathematics010102 general mathematicsMathematics::General Topology02 engineering and technology01 natural sciencesSet (abstract data type)Mathematics::K-Theory and HomologyBounded function0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing0101 mathematicsMathematical structureCompletely distributive latticeMathematics
researchProduct

Fast Algorithms for Pseudoarboricity

2015

The densest subgraph problem, which asks for a subgraph with the maximum edges-to-vertices ratio d∗, is solvable in polynomial time. We discuss algorithms for this problem and the computation of a graph orientation with the lowest maximum indegree, which is equal to ⌈d∗⌉. This value also equals the pseudoarboricity of the graph. We show that it can be computed in O(|E| √ log log d∗) time, and that better estimates can be given for graph classes where d∗ satisfies certain asymptotic bounds. These runtimes are achieved by accelerating a binary search with an approximation scheme, and a runtime analysis of Dinitz’s algorithm on flow networks where all arcs, except the source and sink arcs, hav…

Binary search algorithmComputation0102 computer and information sciences02 engineering and technologyOrientation (graph theory)01 natural sciencesFlow (mathematics)010201 computation theory & mathematicsLog-log plotTheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY0202 electrical engineering electronic engineering information engineeringGraph (abstract data type)020201 artificial intelligence & image processingUnit (ring theory)AlgorithmTime complexityMathematicsofComputing_DISCRETEMATHEMATICSMathematics2016 Proceedings of the Eighteenth Workshop on Algorithm Engineering and Experiments (ALENEX)
researchProduct