Search results for "Multiagent Systems"

showing 10 items of 104 documents

A spatially explicit model to simulate soil microbial communities’ dynamics at an agricultural landscape scale

2021

Soil microorganisms play a major role in soil functions and are an efficient indicator to evaluate the impact of agricultural practices on soil quality. Biogeographical studies over wide scales ranging from landscape to countries have concluded that soil microbial abundance and soil prokaryotic richness is following a heterogeneous distribution in space under the dependence of soil properties (e.g. pH, soil texture, organic matter content) and agricultural practices. The goal of this study is the creation of a model that can predict dynamics of soil microbial communities depending on the agricultural management over time. For this, we focus on a monitored landscape (Fénay landscape, 1.200 h…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI]Agent-based modelAgricultural landscapeParticipatory[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and SimulationSoil microbial communities
researchProduct

An ABM to support collective reflection on the evolution of mobility

2021

International audience; Transport infrastructures play a large part in defining a smart, sustainable and resilient city. Planning transportation systems traditionally rely on well-known evolutions of roads or public transportation (roundabouts for security, etc.). Yet, infrastructures might also benefit from, or may have to adapt to, recent disruptive innovations concerning modalities, technologies and societal organization (autonomous cars, smart infrastructure, homeworking, etc.). However, innovative urban policies might either facilitate mobility and increase citizen well-being, or create negative side effects. Urban planning therefore requires the city to assess the impact of these disr…

[INFO.INFO-AI] Computer Science [cs]/Artificial Intelligence [cs.AI][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Traffic simulation[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and Simulation[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationCollective reflection supportProspective simulation[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Urban mobility
researchProduct

Scheduling independent stochastic tasks under deadline and budget constraints

2018

This article discusses scheduling strategies for the problem of maximizing the expected number of tasks that can be executed on a cloud platform within a given budget and under a deadline constraint. The execution times of tasks follow independent and identically distributed probability laws. The main questions are how many processors to enroll and whether and when to interrupt tasks that have been executing for some time. We provide complexity results and an asymptotically optimal strategy for the problem instance with discrete probability distributions and without deadline. We extend the latter strategy for the general case with continuous distributions and a deadline and we design an ef…

[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC]Mathematical optimizationOperations researchComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]Cloud computing[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyExpected valueTheoretical Computer ScienceScheduling (computing)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]deadline0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]schedulingComputer Science::Operating SystemsComputingMilieux_MISCELLANEOUSBudget constraint020203 distributed computingcloud platformindependent tasksbusiness.industry[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulationstochastic costAsymptotically optimal algorithmContinuous distributions[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Hardware and ArchitectureProbability distribution[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]020201 artificial intelligence & image processingInterrupt[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessSoftwarebudget
researchProduct

Probability and algorithmics: a focus on some recent developments

2017

Jean-François Coeurjolly, Adeline Leclercq-Samson Eds.; International audience; This article presents different recent theoretical results illustrating the interactions between probability and algorithmics. These contributions deal with various topics: cellular automata and calculability, variable length Markov chains and persistent random walks, perfect sampling via coupling from the past. All of them involve discrete dynamics on complex random structures.; Cet article présente différents résultats récents de nature théorique illustrant les interactions entre probabilités et algorithmique. Ces contributions traitent de sujets variés : automates cellulaires et calculabilité, chaînes de Mark…

[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC]T57-57.97Focus (computing)Applied mathematics. Quantitative methodsTheoretical computer scienceMarkov chainComputer science[MATH.MATH-DS]Mathematics [math]/Dynamical Systems [math.DS][INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM]Variable lengthRandom walkCellular automaton[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL]Perfect sampling[MATH.MATH-PR]Mathematics [math]/Probability [math.PR]Coupling from the past[INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Algorithmics[MATH.MATH-CO]Mathematics [math]/Combinatorics [math.CO]QA1-939Mathematics
researchProduct

Automated detection of contextuality proofs with intermediate numbers of observables

2021

<div style=""&gt<font face="arial, helvetica"&gt<span style="font-size: 13px;"&gtQuantum contextuality takes an important place amongst the concepts of quantum computing that bring an advantage over its classical counterpart. For a large class of contextuality </span&gt</font&gt<span style="font-size: 13px; font-family: arial, helvetica;"&gtproofs, aka. observable-based proofs of the Kochen-Specker Theorem, we first formulate the</span&gt</div&gt<div style=""&gt<font face="arial, helvetica"&gt<span style="font-size: 13px;"&gtcontextuality property as the absence of solutions to a linear system. Then we explain why </span&gt</font&gt<span style="font-size: 13px; font-family: arial, helvetica…

[INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and Simulation[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

A Route toward Protein Sequencing using Solid-State Nanopores Assisted by Machine Learning

2022

Solid-State Nanopores made of 2-D materials such as MoS2 have emerged as one of the most versatile sensors for single-biomolecule detection, which is essential for early disease diagnosis (biomarker detection). One of the most promising applications of SSN is DNA and protein sequencing, at a low cost and faster than the current standard methods. The detection principle relies on measuring the relatively small variations of ionic current as charged biomolecules immersed in an electrolyte traverse the nanopore, in response to an external voltage applied across the membrane. The passage of a biomolecule through the pore yields information about its structure and chemical properties, as demonst…

[INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and Simulation[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Computer-assisted enumeration and classification of multi-qubit doilies

2022

For N ≥ 2, an N-qubit doily is a doily living in the N-qubit symplectic polar space. These doilies are related to operator-based proofs of quantum contextuality. Following and extending the strategy of [SdBHG21] that focused exclusively on three-qubit doilies, we first bring forth several formulas giving the number of both linear and quadratic doilies for any N &gt; 2. Then we present an effective algorithm for the generation of all N-qubit doilies. Using this algorithm for N = 4 and N = 5, we provide a classification of N-qubit doilies in terms of types of observables they feature and number of negative lines they are endowed with.

[INFO.INFO-ET] Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE][INFO.INFO-DC] Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC][INFO.INFO-IU] Computer Science [cs]/Ubiquitous Computing[INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MO] Computer Science [cs]/Modeling and Simulation[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
researchProduct

Agent-based modeling of the social and economic factors affecting the choice of transportation mode : application to the Beirut city

2018

In urban and peri-urban environments, transport and mobility are strongly linked to socio-economic activities. They are influenced by individual's personal psychology, social norms, resistance to change, personal attitude, habits, fears and beliefs. Beirut is a mono-centric city with transport supply poverty. Vehicle ownership has increased rapidly in response to the shortage of public transportation. Currently, there is an opportunity to develop mobility management services and establish sustainable mobility and accessibility in Beirut. This requires that transport modes be affordable, efficient and environmentally friendly, as well as technologies that minimize the energy consumption by f…

[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingComportement de mobilitéSysteme multiagentMultiagent systemsMethodology[INFO.INFO-IU] Computer Science [cs]/Ubiquitous ComputingMobilite urbaineMobility behaviorMethodologieSimulationUrban mobility
researchProduct

Vers la conception d'une action de réponse pour la gestion de catastrophe, utilisant la modélisation de connaissances

2018

International audience; Ce travail de positionnement souligne les problèmes actuels liés aux diffé-rents aspects de la collaboration inter agence pendant la réponse à une catastrophe. La coordination et la coopération dépendent de l'usage et du partage d'informations, qui doivent faire face aux problèmes d'interopérabilité, de droits d'accès et de qualité. Le projet de recherche a pour but de fournir une évaluation de l'impact de l'information sur la réponse à une catastrophe afin d'aider la prise de décision concernant l'usage et le partage de l'information en répondant à des questions telles que: quelles informa-tions devraient être partagées ou quelle qualité de données utilisées pour am…

[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-MA] Computer Science [cs]/Multiagent Systems [cs.MA]
researchProduct

Anomaly‐based intrusion detection systems: The requirements, methods, measurements, and datasets

2021

International audience; With the Internet's unprecedented growth and nations' reliance on computer networks, new cyber‐attacks are created every day as means for achieving financial gain, imposing political agendas, and developing cyberwarfare arsenals. Network security is thus acquiring increasing attention among researchers, practitioners, network architects, policy makers, and others. To defend organizations' networks from existing, foreseen, and future threats, intrusion detection systems (IDSs) are becoming a must. Existing surveys on anomaly‐based IDS (AIDS) focus on specific components such as detection mechanisms and lack many others. In contrast to existing surveys, this article co…

business.industryComputer scienceAnomaly (natural sciences)020206 networking & telecommunications02 engineering and technologyIntrusion detection system[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Computer securitycomputer.software_genre[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe Internet[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Electrical and Electronic Engineering[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businesscomputer
researchProduct