Search results for "Distributed"

showing 10 items of 1260 documents

Almost sure rates of mixing for i.i.d. unimodal maps

2002

International audience; It has been known since the pioneering work of Jakobson and subsequent work by Benedicks and Carleson and others that a positive measure set of quadratic maps admit an absolutely continuous invariant measure. Young and Keller-Nowicki proved exponential decay of its correlation functions. Benedicks and Young, and Baladi and Viana studied stability of the density and exponential rate of decay of the Markov chain associated to i.i.d. small perturbations. The almost sure statistical properties of the sample stationary measures of i.i.d. itineraries are more difficult to estimate than the "averaged statistics". Adapting to random systems, on the one hand partitions associ…

Independent and identically distributed random variables[MATH.MATH-PR] Mathematics [math]/Probability [math.PR]Mathematics::Dynamical SystemsMarkov chainGeneral Mathematics010102 general mathematicsMathematical analysisErgodicityAbsolute continuity01 natural sciencesExponential function[MATH.MATH-PR]Mathematics [math]/Probability [math.PR]010104 statistics & probabilityQuadratic equationInvariant measure0101 mathematicsExponential decayddc:510Mathematics
researchProduct

On the Statistical Analysis of Equal Gain Combining over Multiple Double Rice Fading Channels in Cooperative Networks

2010

This article analyzes the statistical properties of narrowband mobile-to-mobile (M2M) fading channels with equal gain combining (EGC) under line-of-sight (LOS) propagation conditions. Here, we study a dual-hop amplify-and-forward (AF)relay network. It is assumed that there can exist LOS components in the transmission links between the source mobile station and the destination mobile station via K mobile relays. In order to cater for asymmetric fading conditions in the relay links, the received signal envelope at the output of the equal gain (EG) combiner is thus modeled as a sum of K double Rice processes. These processes are considered to be independent but not necessarily identically dist…

Independent and identically distributed random variablesbusiness.industryComputer scienceCumulative distribution functionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYTopologylaw.inventionNarrowbandRelaylawMobile stationComputer Science::Networking and Internet ArchitectureElectronic engineeringWirelessProbability distributionFadingbusinessComputer Science::Information TheoryCommunication channel2010 IEEE 72nd Vehicular Technology Conference - Fall
researchProduct

Inverted and mirror repeats in model nucleotide sequences.

2007

We analytically and numerically study the probabilistic properties of inverted and mirror repeats in model sequences of nucleic acids. We consider both perfect and non-perfect repeats, i.e. repeats with mismatches and gaps. The considered sequence models are independent identically distributed (i.i.d.) sequences, Markov processes and long range sequences. We show that the number of repeats in correlated sequences is significantly larger than in i.i.d. sequences and that this discrepancy increases exponentially with the repeat length for long range sequences.

Independent identically distributedTime FactorsMolecular Sequence DataMarkov processNucleic Acid DenaturationQuantitative Biology - Quantitative MethodsCombinatoricssymbols.namesakeExponential growthChromosomes Human inverted repeatsNucleotideQuantitative Biology - GenomicsRNA Small InterferingQuantitative Methods (q-bio.QM)Sequence (medicine)MathematicsProbabilityRepetitive Sequences Nucleic AcidGenomics (q-bio.GN)chemistry.chemical_classificationStochastic ProcessesModels StatisticalBase SequenceNucleotidesProbabilistic logicMarkov ChainschemistryFOS: Biological sciencesNucleic acidsymbolsNucleic Acid RenaturationNucleic Acid ConformationAlgorithmsPhysical review. E, Statistical, nonlinear, and soft matter physics
researchProduct

Computing Real-Time Dynamic Origin/Destination Matrices from Vehicle-to-Infrastructure Messages Using a Multi-Agent System

2012

Dynamic Origin/Destination matrices are one of the most important parameters for efficient and effective transportation system management. These matrices describe the vehicle flow between different points within a region of interest for a given period of time. Usually, dynamic O/D matrices are estimated from traffic counts provided by induction loop detectors, home interview and/or license plate surveys. Unfortunately, estimation methods take O/D flows as time invariant for a certain number of intervals of time, which cannot be suitable for some traffic applications. However, the advent of information and communication technologies (e.g., vehicle-to-infrastructure dedicated short range comm…

Induction loopComputer scienceDistributed computingMulti-agent systemReal-time computingJADE (programming language)computer.software_genreDedicated short-range communicationsDomain (software engineering)LTI system theoryMatrix (mathematics)Systems managementcomputercomputer.programming_language
researchProduct

A formal model based on Game Theory for the analysis of cooperation in distributed service discovery

2016

New systems can be designed, developed, and managed as societies of agents that interact with each other by offering and providing services. These systems can be viewed as complex networks where nodes are bounded rational agents. In order to deal with complex goals, they require cooperation of the other agents to be able to locate the required services. The aim of this paper is formally and empirically analyze under which circumstances cooperation emerges in decentralized search of services. We propose a repeated game model that formalizes the interactions among agents in a search process where agents are free to choose between cooperate or not in the process. Agents make decisions based on…

Information Systems and ManagementComputer scienceProcess (engineering)BIBLIOTECONOMIA Y DOCUMENTACION02 engineering and technologyEconomiaNash equilibriumTheoretical Computer Sciencesymbols.namesakeArtificial IntelligenceOrder (exchange)Repeated games0202 electrical engineering electronic engineering information engineeringCIENCIAS DE LA COMPUTACION E INTELIGENCIA ARTIFICIALDistributed service discoveryManagement science020206 networking & telecommunicationsRational agentComplex network16. Peace & justiceComputer Science ApplicationsRisk analysis (engineering)Control and Systems EngineeringNash equilibriumBounded functionsymbolsRepeated game020201 artificial intelligence & image processingNetworksGame theoryLENGUAJES Y SISTEMAS INFORMATICOSSoftwareInformation Sciences
researchProduct

A Two-layer Partitioning for Non-point Spatial Data

2021

Non-point spatial objects (e.g., polygons, linestrings, etc.) are ubiquitous and their effective management is always timely. We study the problem of indexing non-point objects in memory. We propose a secondary partitioning technique for space-oriented partitioning indices (e.g., grids), which improves their performance significantly, by avoiding the generation and elimination of duplicate results. Our approach is novel and of a high impact, as (i) it is extremely easy to implement and (ii) it can be used by any space-partitioning index. We show how our approach can be used to boost the performance of spatial range queries. We also show how we can avoid performing the expensive refinement s…

Information engineeringDistributed databaseRange query (data structures)Computer scienceSearch engine indexingScalabilityTwo layerPoint (geometry)Data miningcomputer.software_genreSpatial analysiscomputer
researchProduct

Multiple UAV cooperative path planning via neuro-dynamic programming

2004

In this paper, a team of n unmanned air-vehicles (UAVs) in cooperative path planning is given the task of reaching the assigned target while i) avoiding threat zones ii) synchronizing minimum time arrivals on the target, and iii) ensuring arrivals coming from different directions. We highlight three main contributions. First we develop a novel hybrid model and suit it to the problem at hand. Second, we design consensus protocols for the management of information. Third, we synthesize local predictive controllers through a distributed, scalable and suboptimal neuro-dynamic programming (NDP) algorithm.

Information managementEngineeringbusiness.industryDistributed computingSynchronizingControl engineeringUnmanned air-vehicles (UAV)Task (project management)Dynamic programmingModel predictive controlDistributed algorithmScalabilityNeuro-dynamic programmingMotion planningbusinessNeuro-dynamic programming; Unmanned air-vehicles (UAV)
researchProduct

Distributed Coverage of Ego Networks in F2F Online Social Networks

2016

Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …

Information privacyComputer scienceCryptography02 engineering and technologyWorld Wide WebSet (abstract data type)Artificial IntelligenceDistributed online social networksDominating setServer0202 electrical engineering electronic engineering information engineering1707P2PSettore INF/01 - InformaticaSocial networkDistributed databasebusiness.industryFriend-to-friend networkComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsData AvailabilityDistributed Online Social NetworkDistributed Online Social Networks; P2P; Data Availability; friend-to-friend networksComputer Networks and CommunicationPrivacyDistributed algorithm020201 artificial intelligence & image processingfriend-to-friend networksbusinessComputer network2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)
researchProduct

An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid

2021

International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …

Information privacysmart citiesComputer Networks and CommunicationsComputer scienceDistributed computingCryptography02 engineering and technologyEncryptionPaillier cryptosystem[SPI]Engineering Sciences [physics]Ciphertext0202 electrical engineering electronic engineering information engineeringAuthenticationbusiness.industry020208 electrical & electronic engineering020206 networking & telecommunicationssecurity and privacyComputer Science ApplicationsData aggregationsmart grid (SG)Smart gridHardware and ArchitectureSignal ProcessingScalabilityfog computingbusinessInformation Systems
researchProduct

Rings for privacy: An architecture for privacy-preserving user profiling

2014

Information privacysocial networking (online) data privacy human factors InternetSettore ING-INF/03 - TelecomunicazioniComputer sciencePrivacy softwarebusiness.industryInternet privacyComputer securitycomputer.software_genrePrivacy preservingprivacy-preserving users profiling FCM clustering distributed unstable scenarioProfiling (information science)The InternetArchitecturebusinesscomputer
researchProduct