Search results for "D algorithm"

showing 10 items of 327 documents

Biological Peer-To-Peer Networks: From Bacterial Communication To The Development Of Synthetic Distributed Systems

2014

We address Bacterial Computing from the study of bacterial communication mechanisms, by assuming a conceptual framework between Computer Science and Biology in which cells are conceived as nodes. This nodes process information through modules formed of DNA as encoded software (biobricks) and are connected to other nodes. In order to understand how peerto-peer mechanisms operate in bacteria, we have studied Quorum sensing and Conjugation with an engineering perspective. Learning how cells process and exchange information we try to glimpse new theoretical approaches to develop synthetic networks and to transfer complex algorithms to natural environments. Extending bacterial communications we …

:CIENCIAS TECNOLÓGICAS [UNESCO]Bacterial-based AlgorithmsConjugationComplex Adaptive SystemsUNESCO::CIENCIAS DE LA VIDAUNESCO::CIENCIAS TECNOLÓGICAS:CIENCIAS DE LA VIDA [UNESCO]GeneralLiterature_MISCELLANEOUSSimulationP2P Society
researchProduct

Computing abelian periods in words

2011

International audience

Abelian period Abelian repetition weak repetition design of algorithms text algorithms combinatorics on words[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]ComputingMilieux_MISCELLANEOUS
researchProduct

Simulazione numerica tridimensionale del campi de moto indotti dal vento

2006

Nell’articolo viene proposto un modello numerico tridimensionale al volume finiti, che viene utilizzato per la simulazione di campi di moto indotti dal mento in corpi idrici con batimetria complessa. I risultati numerici sono confrontati con misure sperimentali. Al fine di verificare gli effetti sul calcolo del campi idrodinamici di alcume ipotesi simplificative, relative alla distribuzione verticale della pressione e degli sforzi di Reynolds, sono stati quindi condotti alcuni test numerici, dai quali si è evidenziato che l’ipotesi di distribuzione idrostatica delle pressioni, cui si fa ricorso nelle approssinazioni di tipo “quasi-3D”, può essere utilizzata per il carcolo del profili vertic…

Anàlisi numèrica:Matemàtiques i estadística::Anàlisi numèrica::Mètodes numèrics [Àrees temàtiques de la UPC]Matemàtiques i estadísticaMètodes numèricsNumerical methods and algorithmsIngeniería del agua
researchProduct

Sequential Mining Classification

2017

Sequential pattern mining is a data mining technique that aims to extract and analyze frequent subsequences from sequences of events or items with time constraint. Sequence data mining was introduced in 1995 with the well-known Apriori algorithm. The algorithm studied the transactions through time, in order to extract frequent patterns from the sequences of products related to a customer. Later, this technique became useful in many applications: DNA researches, medical diagnosis and prevention, telecommunications, etc. GSP, SPAM, SPADE, PrefixSPan and other advanced algorithms followed. View the evolution of data mining techniques based on sequential data, this paper discusses the multiple …

Apriori algorithmComputer sciencebusiness.industryData stream miningConcept mining02 engineering and technologycomputer.software_genreMachine learningGSP AlgorithmTree (data structure)Statistical classificationComputingMethodologies_PATTERNRECOGNITION020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingData miningArtificial intelligencebusinessK-optimal pattern discoverycomputerFSA-Red Algorithm2017 International Conference on Computer and Applications (ICCA)
researchProduct

A Bacterial-Based Algorithm to Simulate Complex Adaptative Systems

2014

Paper presented at the 13th International Conference on Simulation of Adaptive Behavior which took place at Castellón, Spain in 2014, July 22-25. Bacteria have demonstrated an amazing capacity to overcome envi-ronmental changes by collective adaptation through genetic exchanges. Using a distributed communication system and sharing individual strategies, bacteria propagate mutations as innovations that allow them to survive in different envi-ronments. In this paper we present an agent-based model which is inspired by bacterial conjugation of DNA plasmids. In our approach, agents with bounded rationality interact in a common environment guided by local rules, leading to Complex Adaptive Syste…

Artificial SocietyComputer sciencebusiness.industryComplex Adaptive SystemsArtificial societyBacterial conjugationAutonomous agentCASComplexityCommunications systemBounded rationalityBiblioteconomía y DocumentaciónP2P SocietyBacterial-based AlgorithmsCollective adaptationArtificial intelligenceComplex adaptive systemAdaptation (computer science)businessAlgorithm
researchProduct

Efficient distributed average consensus in wireless sensor networks

2020

International audience; Computing the distributed average consensus in Wireless Sensor Networks (WSNs) is investigated in this article. This problem, which is both natural and important, plays a significant role in various application fields such as mobile agents and fleet vehicle coordination, network synchronization, distributed voting and decision, load balancing of divisible loads in distributed computing network systems, and so on. By and large, the average consensus' objective is to have all nodes in the network converged to the average value of the initial nodes' measurements based only on local nodes' information states. In this paper, we introduce a fully distributed algorithm to a…

AtomicitySpeedupComputer Networks and CommunicationsSynchronization networksComputer sciencebusiness.industry020206 networking & telecommunications[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyEnergy consumptionLoad balancing (computing)[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Consensus[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Distributed algorithm0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processing[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer networkComputer Communications
researchProduct

Bio-inspired security analysis for IoT scenarios

2020

Computer security has recently become more and more important as the world economy dependency from data has kept growing. The complexity of the systems that need to be kept secure calls for new models capable of abstracting the interdependencies among heterogeneous components that cooperate at providing the desired service. A promising approach is attack graph analysis, however, the manual analysis of attack graphs is tedious and error prone. In this paper we propose to apply the metabolic network model to attack graph analysis, using three interacting bio-inspired algorithms: topological analysis, flux balance analysis, and extreme pathway analysis. A developed framework for graph building…

Bio-inspired techniqueService (systems architecture)Security analysisIoTDependency (UML)Computer scienceNetwork securityDistributed computingmedia_common.quotation_subject0211 other engineering and technologies02 engineering and technologyMetabolic networksAttack graphs; Bio-inspired algorithms; Bio-inspired techniques; IoT; Metabolic networks; Network security; Security analysis; System securityAttack graph03 medical and health sciences0302 clinical medicineUse casemedia_common021110 strategic defence & security studiesSecurity analysisbusiness.industryMetabolic network030208 emergency & critical care medicineBio-inspired techniquesNetwork securitySystem securityFlux balance analysisInterdependenceHardware and ArchitectureBio-inspired algorithmGraph (abstract data type)businessSoftwareAttack graphsBio-inspired algorithms
researchProduct

The hybrid algorithm (Hbmr) to fight against blood doping in sports

2010

Blood dopingComputer scienceElectronic engineeringPhysical Therapy Sports Therapy and RehabilitationOrthopedics and Sports MedicineHybrid algorithmScandinavian Journal of Medicine & Science in Sports
researchProduct

The expressive power of the shuffle product

2010

International audience; There is an increasing interest in the shuffle product on formal languages, mainly because it is a standard tool for modeling process algebras. It still remains a mysterious operation on regular languages.Antonio Restivo proposed as a challenge to characterize the smallest class of languages containing the singletons and closed under Boolean operations, product and shuffle. This problem is still widely open, but we present some partial results on it. We also study some other smaller classes, including the smallest class containing the languages composed of a single word of length 2 which is closed under Boolean operations and shuffle by a letter (resp. shuffle by a l…

Class (set theory)Computer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciences02 engineering and technologyStar (graph theory)01 natural sciencesExpressive powerTheoretical Computer ScienceRegular languageFormal language0202 electrical engineering electronic engineering information engineeringArithmeticAlgebraic numberComputingMilieux_MISCELLANEOUSDiscrete mathematicsComputer Science Applicationsshuffle operatorComputational Theory and Mathematics010201 computation theory & mathematicsProduct (mathematics)Formal language020201 artificial intelligence & image processingBoolean operations in computer-aided designWord (computer architecture)Information Systems
researchProduct

Fast Matrix Multiplication

2015

Until a few years ago, the fastest known matrix multiplication algorithm, due to Coppersmith and Winograd (1990), ran in time O(n2.3755). Recently, a surge of activity by Stothers, Vassilevska-Williams, and Le~Gall has led to an improved algorithm running in time O(n2.3729). These algorithms are obtained by analyzing higher and higher tensor powers of a certain identity of Coppersmith and Winograd. We show that this exact approach cannot result in an algorithm with running time O(n2.3725), and identify a wide class of variants of this approach which cannot result in an algorithm with running time $O(n^{2.3078}); in particular, this approach cannot prove the conjecture that for every e > 0, …

Class (set theory)Conjecturepeople.profession0102 computer and information sciences02 engineering and technology01 natural sciencesIdentity (music)Matrix multiplicationRunning timeCombinatorics010201 computation theory & mathematicsTensor (intrinsic definition)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingCoppersmithpeopleMathematicsCoppersmith–Winograd algorithmProceedings of the forty-seventh annual ACM symposium on Theory of Computing
researchProduct