Search results for "General Computer Science"
showing 10 items of 895 documents
On the number of factors of Sturmian words
1991
Abstract We prove that for m ⩾1, card( A m ) = 1+∑ m i =1 ( m − i +1) ϕ ( i ) where A m is the set of factors of length m of all the Sturmian words and ϕ is the Euler function. This result was conjectured by Dulucq and Gouyou-Beauchamps (1987) who proved that this result implies that the language (∪ m ⩾0 A m ) c is inherently ambiguous. We also give a combinatorial version of the Riemann hypothesis.
Heuristics for the bi-objective path dissimilarity problem
2009
In this paper the path dissimilarity problem is considered. The problem has previously been studied within several contexts, the most popular of which is motivated by the need to select transportation routes for hazardous materials. The aim of this paper is to formally introduce the problem as a bi-objective optimization problem, in which a single solution consists of a set of p different paths, and two conflicting objectives arise, on one hand the average length of the paths must be kept low, and on the other hand the dissimilarity among the paths in the set should be kept high. Previous methods are reviewed and adapted to this bi-objective problem, thus we can compare the methods using th…
Comparing multicriteria methods in the context of environmental problems
1998
Abstract The present paper gives an analysis of the use of ELECTRE III, PROMETHEE I, II, and SMART decision-aids in the context of four different real applications to environmental problems in Finland. These methods are widely used decision-aids in the real planning processes. The purpose of this study is to define the differences of these methods and the results obtained with them, and in this way also to consider their applicability in aiding environmental decision-making. Furthermore, a comparison of the methods based on a set of randomly generated problems is carried out. The choice in practice will not be easy; PROMETHEE does not differ much from SMART with linear value functions, and …
Birkhoff's aesthetics, Arnheim's entropy. Some remarks on complexity and fuzzy entropy in arts
2015
A judgement of aesthetic in arts is, by sheer consensus, a daunting task that requires evaluation of a whole host of endogenous and exogenous cultural factors. A few of them can actually provide very useful hints in tackling foundational problems in Information Science in a more natural setting than what is usually provided by a typical engineering stance. This interaction can however work the other way about, as instruments from the Information and Computer Science toolkit may help in focusing the less explored features of art and its evaluation. When all the social, historical, hermeneutical and political considerations are stripped from the living flesh of the piece, we lose most of wha…
Algorithmic paradigms for stability-based cluster validity and model selection statistical methods, with applications to microarray data analysis
2012
AbstractThe advent of high throughput technologies, in particular microarrays, for biological research has revived interest in clustering, resulting in a plethora of new clustering algorithms. However, model selection, i.e., the identification of the correct number of clusters in a dataset, has received relatively little attention. Indeed, although central for statistics, its difficulty is also well known. Fortunately, a few novel techniques for model selection, representing a sharp departure from previous ones in statistics, have been proposed and gained prominence for microarray data analysis. Among those, the stability-based methods are the most robust and best performing in terms of pre…
Intelligent Management Systems for Energy Efficiency in Buildings: A Survey
2014
In recent years, reduction of energy consumption in buildings has increasingly gained interest among researchers mainly due to practical reasons, such as economic advantages and long-term environmental sustainability. Many solutions have been proposed in the literature to address this important issue from complementary perspectives, which are often hard to capture in a comprehensive manner. This survey article aims at providing a structured and unifying treatment of the existing literature on intelligent energy management systems in buildings, with a distinct focus on available architectures and methodology supporting a vision transcending the well-established smart home vision, in favor o…
A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems
2019
Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent …
Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: A DES Instance
2023
Encryption algorithms based on block ciphers are among the most widely adopted solutions for providing information security. Over the years, a variety of methods have been proposed to evaluate the robustness of these algorithms to different types of security attacks. One of the most effective analysis techniques is differential cryptanalysis, whose aim is to study how variations in the input propagate on the output. In this work we address the modeling of differential attacks to block cipher algorithms by defining a Bayesian framework that allows a probabilistic estimation of the secret key. In order to prove the validity of the proposed approach, we present as case study a differential att…
Modeling and Verification of Symbolic Distributed Applications Through an Intelligent Monitoring Agent
2022
Wireless Sensor Networks (WSNs) represent a key component in emerging distributed computing paradigms such as IoT, Ambient Intelligence, and Smart Cities. In these contexts, the difficulty of testing, verifying, and monitoring applications in their intended scenarios ranges from challenging to impractical. Current simulators can only be used to investigate correctness at source code level and with limited accuracy. This paper proposes a system and a methodology to model and verify symbolic distributed applications running on WSNs. The approach allows to complement the distributed application code at a high level of abstraction in order to test and reprogram it, directly, on deployed network…
Robot’s Inner Speech Effects on Human Trust and Anthropomorphism
2023
AbstractInner Speech is an essential but also elusive human psychological process that refers to an everyday covert internal conversation with oneself. We argued that programming a robot with an overt self-talk system that simulates human inner speech could enhance both human trust and users’ perception of robot’s anthropomorphism, animacy, likeability, intelligence and safety. For this reason, we planned a pre-test/post-test control group design. Participants were divided in two different groups, one experimental group and one control group. Participants in the experimental group interacted with the robot Pepper equipped with an over inner speech system whereas participants in the control …