Search results for "General Computer Science"

showing 10 items of 895 documents

On the number of factors of Sturmian words

1991

Abstract We prove that for m ⩾1, card( A m ) = 1+∑ m i =1 ( m − i +1) ϕ ( i ) where A m is the set of factors of length m of all the Sturmian words and ϕ is the Euler function. This result was conjectured by Dulucq and Gouyou-Beauchamps (1987) who proved that this result implies that the language (∪ m ⩾0 A m ) c is inherently ambiguous. We also give a combinatorial version of the Riemann hypothesis.

Set (abstract data type)Euler functionCombinatoricssymbols.namesakeRiemann hypothesisGeneral Computer ScienceSturmian wordsymbolsComputer Science(all)Theoretical Computer ScienceMathematicsTheoretical Computer Science
researchProduct

Heuristics for the bi-objective path dissimilarity problem

2009

In this paper the path dissimilarity problem is considered. The problem has previously been studied within several contexts, the most popular of which is motivated by the need to select transportation routes for hazardous materials. The aim of this paper is to formally introduce the problem as a bi-objective optimization problem, in which a single solution consists of a set of p different paths, and two conflicting objectives arise, on one hand the average length of the paths must be kept low, and on the other hand the dissimilarity among the paths in the set should be kept high. Previous methods are reviewed and adapted to this bi-objective problem, thus we can compare the methods using th…

Set (abstract data type)Hazard (logic)Mathematical optimizationOptimization problemGeneral Computer ScienceModeling and SimulationPath (graph theory)GRASPManagement Science and Operations ResearchRouting (electronic design automation)HeuristicsMetaheuristicMathematicsComputers & Operations Research
researchProduct

Comparing multicriteria methods in the context of environmental problems

1998

Abstract The present paper gives an analysis of the use of ELECTRE III, PROMETHEE I, II, and SMART decision-aids in the context of four different real applications to environmental problems in Finland. These methods are widely used decision-aids in the real planning processes. The purpose of this study is to define the differences of these methods and the results obtained with them, and in this way also to consider their applicability in aiding environmental decision-making. Furthermore, a comparison of the methods based on a set of randomly generated problems is carried out. The choice in practice will not be easy; PROMETHEE does not differ much from SMART with linear value functions, and …

Set (abstract data type)Information Systems and ManagementGeneral Computer ScienceOperations researchComputer scienceModeling and SimulationContext (language use)Management Science and Operations ResearchELECTREValue (mathematics)Industrial and Manufacturing EngineeringEuropean Journal of Operational Research
researchProduct

Birkhoff's aesthetics, Arnheim's entropy. Some remarks on complexity and fuzzy entropy in arts

2015

A judgement of aesthetic in arts is, by sheer consensus, a daunting task that requires evaluation of a whole host of endogenous and exogenous cultural factors. A few of them can actually provide very useful hints in tackling foundational problems in Information Science in a more natural setting than what is usually provided by a typical engineering stance. This interaction can however work the other way about, as instruments from the Information and Computer Science toolkit may help in focusing the less explored features of art and its evaluation. When all the social, historical, hermeneutical and political considerations are stripped from the living flesh of the piece, we lose most of wha…

Settore INF/01 - InformaticaGeneral Computer ScienceComputer scienceEntropymedia_common.quotation_subjectJudgementInformation and Computer ScienceFuzzy EntropyComplexity evaluationThe artslcsh:QA75.5-76.95Information scienceComputational MathematicsPoliticsFuzzy entropyAestheticsBeautysortlcsh:Electronic computers. Computer scienceFuzzinessArtmedia_commonInternational Journal of Computational Intelligence Systems
researchProduct

Algorithmic paradigms for stability-based cluster validity and model selection statistical methods, with applications to microarray data analysis

2012

AbstractThe advent of high throughput technologies, in particular microarrays, for biological research has revived interest in clustering, resulting in a plethora of new clustering algorithms. However, model selection, i.e., the identification of the correct number of clusters in a dataset, has received relatively little attention. Indeed, although central for statistics, its difficulty is also well known. Fortunately, a few novel techniques for model selection, representing a sharp departure from previous ones in statistics, have been proposed and gained prominence for microarray data analysis. Among those, the stability-based methods are the most robust and best performing in terms of pre…

Settore INF/01 - InformaticaGeneral Computer Sciencebusiness.industryComputer scienceBioinformaticsModel selectionGeneral statisticsMachine learningcomputer.software_genreTheoretical Computer ScienceComputational biologyAnalysis of massive datasetsMachine learningCluster (physics)Algorithms and data structures General statistics Analysis of massive datasets Machine learning Computational biology BioinformaticsAlgorithms and data structuresAlgorithm designArtificial intelligenceCluster analysisbusinessCompleteness (statistics)computerComputer Science(all)Theoretical Computer Science
researchProduct

Intelligent Management Systems for Energy Efficiency in Buildings: A Survey

2014

In recent years, reduction of energy consumption in buildings has increasingly gained interest among researchers mainly due to practical reasons, such as economic advantages and long-term environmental sustainability. Many solutions have been proposed in the literature to address this important issue from complementary perspectives, which are often hard to capture in a comprehensive manner. This survey article aims at providing a structured and unifying treatment of the existing literature on intelligent energy management systems in buildings, with a distinct focus on available architectures and methodology supporting a vision transcending the well-established smart home vision, in favor o…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniBuilding management systemAmbient intelligenceGeneral Computer ScienceAmbient intelligence; Building management systems; Energy savingbusiness.industryComputer scienceManagement scienceEnergy managementBuilding management systemsEnergy consumptionTheoretical Computer ScienceBuilding management systems energy saving ambient intelligenceRisk analysis (engineering)Home automationEnergy savingSustainabilityDesign choiceAmbient intelligencebusinessEfficient energy use
researchProduct

A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems

2019

Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGeneral Computer ScienceDistributed algorithmComputer scienceMulti-agent systemQuality of servicemedia_common.quotation_subjectNetwork simulation020206 networking & telecommunications02 engineering and technologycomputer.software_genreVariety (cybernetics)Simulation softwareDistributed systems security.Risk analysis (engineering)Software deploymentRobustness (computer science)020204 information systems0202 electrical engineering electronic engineering information engineeringDisseminationcomputerReputationmedia_common
researchProduct

Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: A DES Instance

2023

Encryption algorithms based on block ciphers are among the most widely adopted solutions for providing information security. Over the years, a variety of methods have been proposed to evaluate the robustness of these algorithms to different types of security attacks. One of the most effective analysis techniques is differential cryptanalysis, whose aim is to study how variations in the input propagate on the output. In this work we address the modeling of differential attacks to block cipher algorithms by defining a Bayesian framework that allows a probabilistic estimation of the secret key. In order to prove the validity of the proposed approach, we present as case study a differential att…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGeneral Computer ScienceGeneral EngineeringGeneral Materials ScienceElectrical and Electronic EngineeringDifferential Cryptanalysis Bayesian Networks Probabilistic Inference DESIEEE Access
researchProduct

Modeling and Verification of Symbolic Distributed Applications Through an Intelligent Monitoring Agent

2022

Wireless Sensor Networks (WSNs) represent a key component in emerging distributed computing paradigms such as IoT, Ambient Intelligence, and Smart Cities. In these contexts, the difficulty of testing, verifying, and monitoring applications in their intended scenarios ranges from challenging to impractical. Current simulators can only be used to investigate correctness at source code level and with limited accuracy. This paper proposes a system and a methodology to model and verify symbolic distributed applications running on WSNs. The approach allows to complement the distributed application code at a high level of abstraction in order to test and reprogram it, directly, on deployed network…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGeneral Computer ScienceGeneral EngineeringGeneral Materials ScienceElectrical and Electronic EngineeringDistributed applications Distributed processing Embedded Systems Fault detection Fault diagnosis Internet of Things Knowledge based systems Software maintenance Software monitoring Wireless sensor networksIEEE Access
researchProduct

Robot’s Inner Speech Effects on Human Trust and Anthropomorphism

2023

AbstractInner Speech is an essential but also elusive human psychological process that refers to an everyday covert internal conversation with oneself. We argued that programming a robot with an overt self-talk system that simulates human inner speech could enhance both human trust and users’ perception of robot’s anthropomorphism, animacy, likeability, intelligence and safety. For this reason, we planned a pre-test/post-test control group design. Participants were divided in two different groups, one experimental group and one control group. Participants in the experimental group interacted with the robot Pepper equipped with an over inner speech system whereas participants in the control …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGeneral Computer ScienceSocial PsychologyRobotInner speechAnthropomorphismTrustHuman–robot interactionHuman-Computer InteractionPhilosophySettore M-PSI/04 - Psicologia Dello Sviluppo E Psicologia Dell'EducazioneControl and Systems EngineeringElectrical and Electronic EngineeringSelf-talk
researchProduct