当前期刊: "系统结构"类期刊
显示样式:        排序: IF: - GO 导出
我的关注
我的收藏
您暂时未登录!
登录
  • Composing and deploying parallelized service function chains
    J. Netw. Comput. Appl. (IF 5.273) Pub Date : 2020-04-08
    Jun Cai; Zhongwei Huang; Jianzhen Luo; Yan Liu; Huimin Zhao; Liping Liao

    Network Function Virtualization (NFV) provides great flexibility in solving the problem of deploying service function chains (SFCs). The existing serial SFCs organize virtual network functions (VNFs) in a predefined order and execute the VNFs one by one, which can result in high SFC delay as the lengths of the SFCs increases. In order to address this problem, in this work, the SFC parallelization is

    更新日期:2020-04-08
  • Known unknowns: Indeterminacy in authentication in IoT
    Future Gener. Comput. Syst. (IF 5.768) Pub Date : 2020-04-08
    Mohammad Heydari; Alexios Mylonas; Vahid Heydari Fami Tafreshi; Elhadj Benkhelifa; Surjit Singh

    The Internet of Things (IoT), comprising a plethora of heterogeneous devices, is an enabling technology that can improve the quality of our daily lives, for instance by measuring parameters from the environment (e.g., humidity, temperature, weather, energy consumption, traffic, and others) or our bodies (e.g., health data). However, as with any technology, IoT has introduced a number of security and

    更新日期:2020-04-08
  • High-efficiency parallelism solution for a Multiview High-Efficiency Video Coding decoder
    J. Parallel Distrib. Comput. (IF 1.819) Pub Date : 2020-04-08
    Wei Liu; Wei Li; Yong Beom Cho

    Thus far, Multiview High-Efficiency Video Coding (MV-HEVC) can only use a central processing unit (CPU) to perform decompression on a personal computer (PC) or workstation. Because MV-HEVC is much more complex than High-Efficiency Video Coding (HEVC), decompressors need higher parallelism to decompress in real time. Therefore, this study presents a parallel method based on MV-HEVC. Inter-view complete

    更新日期:2020-04-08
  • EAFIM: efficient apriori-based frequent itemset mining algorithm on Spark for big transactional data
    Knowl. Inf. Syst. (IF 2.397) Pub Date : 2020-04-07
    Shashi Raj, Dharavath Ramesh, M. Sreenu, Krishan Kumar Sethi

    Abstract Frequent itemset mining is considered a popular tool to discover knowledge from transactional datasets. It also serves as the basis for association rule mining. Several algorithms have been proposed to find frequent patterns in which the apriori algorithm is considered as the earliest proposed. Apriori has two significant bottlenecks associated with it: first, repeated scanning of input dataset

    更新日期:2020-04-08
  • An Incremental Algorithm for the Role Mining Problem
    Comput. Secur. (IF 3.062) Pub Date : 2020-04-07
    Martin Trnecka; Marketa Trneckova

    The role mining process, i.e. computing minimal set of roles from a user-permission assignment relation, is rather incremental task. In a usual situation the set of roles is already established, and the existing permissions are evolved according to current needs. Computation of roles from scratch after each small change in the data is inefficient. Surprisingly, no incremental algorithm for role mining

    更新日期:2020-04-08
  • 3D homogenized limit analysis of non-periodic multi-leaf masonry walls
    Comput. Struct. (IF 3.354) Pub Date : 2020-04-07
    Simone Tiberti; Gabriele Milani

    This paper presents a 3D model aiming at investigating the out-of-plane collapse behavior of multi-leaf non-periodic masonry walls. These structural elements are widely employed in several constructions that are part of the European architectural heritage, but have been seldom addressed in the available literature due to their natural complexity and uniqueness. Specifically, the model here proposed

    更新日期:2020-04-08
  • Lightweight privacy preservation for secondary users in cognitive radio networks
    J. Netw. Comput. Appl. (IF 5.273) Pub Date : 2020-04-07
    Yali Zeng; Li Xu; Xu Yang; Xun Yi; Ibrahim Khalil

    Cognitive radio is emerging as a technology to alleviate spectrum shortage and to improve spectrum utilization. In database-driven cognitive radio networks (CRNs), secondary users (SUs) must provide their locations to the database to enable channel allocation, which results in severe privacy violation. As SUs are usually energy-constrained or fast-moving, how to provide efficient channel allocation

    更新日期:2020-04-08
  • Low-cost and high-efficiency privacy-protection scheme for distributed compressive video sensing in wireless multimedia sensor networks
    J. Netw. Comput. Appl. (IF 5.273) Pub Date : 2020-04-07
    Di Xiao; Min Li; Mengdi Wang; Jia Liang; Ran Liu

    As a new video coding technology, distributed compressive video sensing (DCVS) uses compressed sensing (CS) independent encoding and joint decoding. Since DCVS breaks through the constraint of traditional video coding, it is suitable for resource-constrained wireless multimedia sensor networks (WMSNs). However, two major issues related to DCVS in WMSNs need to be solved urgently: one is to balance

    更新日期:2020-04-08
  • Machine learning based solutions for security of Internet of Things (IoT): A survey
    J. Netw. Comput. Appl. (IF 5.273) Pub Date : 2020-04-07
    Syeda Manjia Tahsien; Hadis Karimipour; Petros Spachos

    Over the last decade, IoT platforms have been developed into a global giant that grabs every aspect of our daily lives by advancing human life with its unaccountable smart services. Because of easy accessibility and fast-growing demand for smart devices and network, IoT is now facing more security challenges than ever before. There are existing security measures that can be applied to protect IoT.

    更新日期:2020-04-08
  • A priority based greedy path assignment mechanism in OpenFlow based datacenter networks
    J. Netw. Comput. Appl. (IF 5.273) Pub Date : 2020-04-07
    Ali Raza; Sanghwan Lee

    During the past decades, due to the advances of the cloud computing technology with tens of thousands of processing machines, the intra data-center network traffic has increased tremendously. In data-center networks, the typical communication patterns of cloud computing technologies such as map-reduce require short latency of the request and response messages to achieve high service quality. Thus,

    更新日期:2020-04-08
  • EUMD: Efficient slot utilization based missing tag detection with unknown tags
    J. Netw. Comput. Appl. (IF 5.273) Pub Date : 2020-04-06
    Kai Lin; Honglong Chen; Xin Ai; Vladimir Shakhov; Lina Ni; Jiguo Yu; Yanjun Li

    Radio frequency identification (RFID) technology, which obtained significant development in the past several decades, is widely applied in numerous industrial applications. One of the typical applications is to detect the missing tags, which can perform real-time detection of missing objects while each object is attached with a low-cost RFID tag in a large-scale warehouse. However, there actually may

    更新日期:2020-04-08
  • Secure software placement and configuration
    Future Gener. Comput. Syst. (IF 5.768) Pub Date : 2020-04-07
    Zoltán Ádám Mann

    Finding the best way to place the components of an application on a set of heterogeneous servers is a challenging task, especially if some components are associated with security requirements. To address security requirements, several security controls may be available, some of them software-based (e.g., encryption), others hardware-based (e.g., trusted execution environments). Security controls may

    更新日期:2020-04-08
  • Adaptive learning of aggregate analytics under dynamic workloads
    Future Gener. Comput. Syst. (IF 5.768) Pub Date : 2020-04-07
    Fotis Savva; Christos Anagnostopoulos; Peter Triantafillou

    Large organizations have seamlessly incorporated data-driven decision making in their operations. However, as data volumes increase, expensive big data infrastructures are called to rescue. In this setting, analytics tasks become very costly in terms of query response time, resource consumption, and money in cloud deployments, especially when base data are stored across geographically distributed data

    更新日期:2020-04-08
  • A new approach in reject inference of using ensemble learning based on global semi-supervised framework
    Future Gener. Comput. Syst. (IF 5.768) Pub Date : 2020-04-07
    Yan Liu; Xiner Li; Zaimei Zhang

    Credit scoring in online Peer-to-Peer (P2P) lending faces a huge challenge, which is the credit scoring models discard rejected applicants. This selective discarding leads to bias in the parameters of the models and ultimately affects the performance of credit evaluation. One approach for handling this problem is to adopt reject inference, which is a technique that infer the status of rejected samples

    更新日期:2020-04-08
  • On Byzantine fault tolerance in multi-master Kubernertes clusters
    Future Gener. Comput. Syst. (IF 5.768) Pub Date : 2020-04-07
    Gor Mack Diouf; Halima Elbiaze; Wael Jaafar

    Docker container virtualization technology is being widely adopted in cloud computing environments because of its lightweight and efficiency. However, it requires adequate control and management via an orchestrator. As a result, cloud providers are adopting the open-access Kubernetes platform as the standard orchestrator of containerized applications. To ensure applications’ availability in Kubernetes

    更新日期:2020-04-08
  • Data-Driven Distributed Stochastic Model Predictive Control with Closed-Loop Chance Constraint Satisfaction
    arXiv.cs.SY Pub Date : 2020-04-06
    Simon Muntwiler*; Kim P. Wabersich*; Lukas Hewing; Melanie N. Zeilinger

    Distributed model predictive control methods for uncertain systems often suffer from considerable conservatism and can tolerate only small uncertainties, due to the use of robust formulations that are amenable to distributed design and computational methods. In this work, we propose a distributed stochastic model predictive control (DSMPC) scheme for dynamically coupled linear discrete-time systems

    更新日期:2020-04-08
  • Feedforward control for wave disturbance rejection on floating offshore wind turbines
    arXiv.cs.SY Pub Date : 2020-04-06
    Mees Al; Alessandro Fontanella; Daan van der Hoek; Yichao Liu; Marco Belloli; Jan-Willem van Wingerden

    Floating offshore wind turbines allow wind energy to be harvested in deep waters. However, additional dynamics and structural loads may result when the floating platform is being excited by wind and waves. In this work, the conventional wind turbine controller is complemented with a novel linear feedforward controller based on wave measurements. The objective of the feedforward controller is to attenuate

    更新日期:2020-04-08
  • Power systems with high renewable energy sources: A review of inertia and frequency control strategies over time
    arXiv.cs.SY Pub Date : 2020-04-06
    Ana Fernández-Guillamón; Emilio Gómez-Lázaro; Eduard Muljadi; Angel Molina-García

    Traditionally, inertia in power systems has been determined by considering all the rotating masses directly connected to the grid. During the last decade, the integration of renewable energy sources, mainly photovoltaic installations and wind power plants, has led to a significant dynamic characteristic change in power systems. This change is mainly due to the fact that most renewables have power electronics

    更新日期:2020-04-08
  • Successive Eigenvalue Removal for Multi-Soliton Spectral Amplitude Estimation
    arXiv.cs.SY Pub Date : 2020-04-06
    Alexander Span; Vahid Aref; Henning Buelow; Stephan ten Brink

    Optical nonlinear Fourier transform-based communication systems require an accurate estimation of a signal's nonlinear spectrum, computed usually by piecewise approximation methods on the signal samples. We propose an algorithm, named successive eigenvalue removal, to improve the spectrum estimation of a multi-soliton pulse. It exploits a property of the Darboux transform that allows removing eigenvalues

    更新日期:2020-04-08
  • Control of Unknown Nonlinear Systems with Linear Time-Varying MPC
    arXiv.cs.SY Pub Date : 2020-04-06
    Dimitris Papadimitriou; Ugo Rosolia; Francesco Borrelli

    We present a Model Predictive Control (MPC) strategy for unknown input-affine nonlinear dynamical systems. A non-parametric method is used to estimate the nonlinear dynamics from observed data. The estimated nonlinear dynamics are then linearized over time varying regions of the state space to construct an Affine Time Varying (ATV) model. Error bounds arising from the estimation and linearization procedure

    更新日期:2020-04-08
  • The Impact of Message Passing in Agent-Based Submodular Maximization
    arXiv.cs.SY Pub Date : 2020-04-07
    David Grimsman; Matthew R. Kirchner; João P. Hespanha; Jason R. Marden

    Submodular maximization problems are a relevant model set for many real-world applications. Since these problems are generally NP-Hard, many methods have been developed to approximate the optimal solution in polynomial time. One such approach uses an agent-based greedy algorithm, where the goal is for each agent to choose an action from its action set such that the union of all actions chosen is as

    更新日期:2020-04-08
  • Estimation of Stability Regions of Droop Control Slopes for MMC-based MTDC Systems
    arXiv.cs.SY Pub Date : 2020-04-07
    Yuntao Zou; Lei Zhang; Jiangchao Qin

    This paper proposes a computational method to efficiently and quickly estimate stability regions of droop control slopes for modular multilevel converter (MMC)-based multiterminal dc (MTDC) systems. The proposed method is based on a general small-signal model consisting of a dc grid with arbitrary topology and MMCs with dq controllers. The general small-signal model developed by a systematic way can

    更新日期:2020-04-08
  • Adaptive Fuzzy Control for Fractional-Order Interconnected Systems with Unknown\\ Control Directions
    arXiv.cs.SY Pub Date : 2020-04-07
    Bingyun Liang; Shiqi Zheng; Choon Ki Ahn; Feng Liu

    This paper concentrates on the study of the decentralized fuzzy control method for a class of fractional-order interconnected systems with unknown control directions. To overcome the difficulties caused by the multiple unknown control directions in fractional-order systems, a novel fractional-order Nussbaum function technique is proposed. This technique is much more general than those of existing works

    更新日期:2020-04-08
  • Challenges and Opportunities in CPS Security: A Physics-based Perspective
    arXiv.cs.SY Pub Date : 2020-04-07
    Chuadhry Mujeeb Ahmed; Jianying Zhou

    The integration of cyber technologies (computing and communication) with the physical world gives rise to complex systems referred to as Cyber Physical Systems (CPS), for example, manufacturing, transportation, smart grid, and water treatment. Many of those systems are part of the critical infrastructure and need to perform safely, reliably, and securely in real-time. CPS security is challenging as

    更新日期:2020-04-08
  • Distributed Coordination of Deferrable Loads: A Real-time Market with Self-fulfilling Forecasts
    arXiv.cs.SY Pub Date : 2020-04-07
    Hazem A. Abdelghany; Simon H. Tindemans; Mathijs M. de Weerdt; Han la Poutré

    Increased uptake of variable renewable generation and further electrification of energy demand necessitate efficient coordination of flexible demand resources to make most efficient use of power system assets. Flexible electrical loads are typically small, numerous, heterogeneous and owned by self-interested agents. Considering the multi-temporal nature of flexibility and the uncertainty involved,

    更新日期:2020-04-08
  • Combining system identification with reinforcement learning-based MPC
    arXiv.cs.SY Pub Date : 2020-04-07
    Andreas B. Martinsen; Anastasios M. Lekkas; Sebastien Gros

    In this paper we propose and compare methods for combining system identification (SYSID) and reinforcement learning (RL) in the context of data-driven model predictive control (MPC). Assuming a known model structure of the controlled system, and considering a parametric MPC, the proposed approach simultaneously: a) Learns the parameters of the MPC using RL in order to optimize performance, and b) fits

    更新日期:2020-04-08
  • Learning Control Barrier Functions from Expert Demonstrations
    arXiv.cs.SY Pub Date : 2020-04-07
    Alexander Robey; Haimin Hu; Lars Lindemann; Hanwen Zhang; Dimos V. Dimarogonas; Stephen Tu; Nikolai Matni

    Inspired by the success of imitation and inverse reinforcement learning in replicating expert behavior through optimal control, we propose a learning based approach to safe controller synthesis based on control barrier functions (CBFs). We consider the setting of a known nonlinear control affine dynamical system and assume that we have access to safe trajectories generated by an expert - a practical

    更新日期:2020-04-08
  • Man in the middle and current injection attacks against the KLJN key exchanger compromised by DC sources
    arXiv.cs.SY Pub Date : 2020-04-03
    Mutaz Melhem; Laszlo Kish

    This study addresses a new question regarding the security of the Kirchhoff-Law-Johnson-Noise (KLJN) scheme compromised by DC sources at Alice and Bob: What is the impact of these parasitic sources on active attacks, such as the man-in-the-middle (MITM) attack, or the current injection attack? The surprising answer is that the parasitic DC sources actually increase the security of the system because

    更新日期:2020-04-08
  • State Space Advanced Fuzzy Cognitive Map approach for automatic and non Invasive diagnosis of Coronary Artery Disease
    arXiv.cs.SY Pub Date : 2020-04-03
    Ioannis D. Apostolopoulos; Peter P. Groumpos; Dimitris I. Apostolopoulos

    Purpose: In this study, the recently emerged advances in Fuzzy Cognitive Maps (FCM) are investigated and employed, for achieving the automatic and non-invasive diagnosis of Coronary Artery Disease (CAD). Methods: A Computer-Aided Diagnostic model for the acceptable and non-invasive prediction of CAD using the State Space Advanced FCM (AFCM) approach is proposed. Also, a rule-based mechanism is incorporated

    更新日期:2020-04-08
  • Benefiting from Linear Behaviour of a Nonlinear Reset-based Element at Certain Frequencies
    arXiv.cs.SY Pub Date : 2020-04-07
    Nima Karbasizadeh; Ali Ahmadi Dastjerdi; Niranjan Saikumar; Duarte Valerio; S. Hassan HosseinNia

    This paper addresses a phenomenon caused by resetting only one of the two states of a so-called second order "Constant in gain Lead in phase" (CgLp) element. CgLp is a recently introduced reset-based nonlinear element, bound to circumvent the well-known linear control limitation -- the waterbed effect. The ideal behaviour of such a filter in the frequency domain is unity gain while providing a phase

    更新日期:2020-04-08
  • Granular Computing: An Augmented Scheme of Degranulation Through a Modified Partition Matrix
    arXiv.cs.SY Pub Date : 2020-04-03
    Kaijie Xu; Witold Pedrycz; Zhiwu Li; Mengdao Xing

    As an important technology in artificial intelligence Granular Computing (GrC) has emerged as a new multi-disciplinary paradigm and received much attention in recent years. Information granules forming an abstract and efficient characterization of large volumes of numeric data have been considered as the fundamental constructs of GrC. By generating prototypes and partition matrix, fuzzy clustering

    更新日期:2020-04-08
  • Bayesian Optimization with Safety Constraints: Safe and Automatic Parameter Tuning in Robotics
    arXiv.cs.SY Pub Date : 2016-02-14
    Felix Berkenkamp; Andreas Krause; Angela P. Schoellig

    Robotic algorithms typically depend on various parameters, the choice of which significantly affects the robot's performance. While an initial guess for the parameters may be obtained from dynamic models of the robot, parameters are usually tuned manually on the real system to achieve the best performance. Optimization algorithms, such as Bayesian optimization, have been used to automate this process

    更新日期:2020-04-08
  • Combined Robust and Stochastic Model Predictive Control for Models of Different Granularity
    arXiv.cs.SY Pub Date : 2020-03-14
    Tim Brüdigam; Johannes Teutsch; Dirk Wollherr; Marion Leibold

    Long prediction horizons in Model Predictive Control (MPC) often prove to be efficient, however, this comes with increased computational cost. Recently, a Robust Model Predictive Control (RMPC) method has been proposed which exploits models of different granularity. The prediction over the control horizon is split into short-term predictions with a detailed model using MPC and long-term predictions

    更新日期:2020-04-08
  • Controlling Human Utilization of Failure-Prone Systems via Taxes
    arXiv.cs.SY Pub Date : 2018-02-26
    Ashish R. Hota; Shreyas Sundaram

    We consider a game-theoretic model where individuals compete over a shared failure-prone system or resource. We investigate the effectiveness of a taxation mechanism in controlling the utilization of the resource at the Nash equilibrium when the decision-makers have behavioral risk preferences, captured by prospect theory. We first observe that heterogeneous prospect-theoretic risk preferences can

    更新日期:2020-04-08
  • Stealth Attacks on the Smart Grid
    arXiv.cs.SY Pub Date : 2018-08-13
    Ke Sun; Iñaki Esnaola; Samir M. Perlaza; H. Vincent Poor

    Random attacks that jointly minimize the amount of information acquired by the operator about the state of the grid and the probability of attack detection are presented. The attacks minimize the information acquired by the operator by minimizing the mutual information between the observations and the state variables describing the grid. Simultaneously, the attacker aims to minimize the probability

    更新日期:2020-04-08
  • Sigma-3: Integration and Analysis of a 6 DOF Robotic Arm Configuration in a Rescue Robot
    arXiv.cs.SY Pub Date : 2020-02-27
    R. A. Bindu; A. A. Neloy; S. Alam; N. J Moni; S. Siddique

    This paper introduces a rescue robot named Sigma 3 which is developed for potential applications such as helping hands for humans where a human can not reach to have an assessment of the hazardous environment. Also, these kinds of robot can be controlled remotely with an adequate control system. The proposed methodology forces on two issues : 1. Novel mechanism design for measuring rotation, joints

    更新日期:2020-04-08
  • Accelerating Stochastic Gradient Descent Based Matrix Factorization on FPGA
    IEEE Trans. Parallel Distrib. Syst. (IF 3.402) Pub Date : 2020-02-18
    Shijie Zhou; Rajgopal Kannan; Viktor K. Prasanna

    Matrix Factorization (MF) based on Stochastic Gradient Descent (SGD) is a powerful machine learning technique to derive hidden features of objects from observations. In this article, we design a highly parallel architecture based on Field-Programmable Gate Array (FPGA) to accelerate the training process of the SGD-based MF algorithm. We identify the challenges for the acceleration and propose novel

    更新日期:2020-04-08
  • T-BASIR: Finding Shutdown Bugs for Cloud-Based Applications in Cloud Spot Markets
    IEEE Trans. Parallel Distrib. Syst. (IF 3.402) Pub Date : 2020-03-13
    Abdullah Alourani; Ajay D. Kshemkalyani; Mark Grechanik

    One of the major advantages of cloud spot instances in cloud computing is to allow stakeholders to economically deploy their applications at much lower costs than that of other types of cloud instances. In exchange, spot instances are often exposed to revocations (i.e., terminations) by cloud providers. With spot instances becoming pervasive, terminations have become a part of the normal behavior of

    更新日期:2020-04-08
  • Automatic Generation of High-Performance FFT Kernels on Arm and X86 CPUs
    IEEE Trans. Parallel Distrib. Syst. (IF 3.402) Pub Date : 2020-03-13
    Zhihao Li; Haipeng Jia; Yunquan Zhang; Tun Chen; Liang Yuan; Richard Vuduc

    This article presents AutoFFT, a template-based code generation framework that can automatically generate high-performance FFT kernels for all natural-number radices. AutoFFT is based on the Cooley-Tukey FFT algorithm, which exploits the symmetric and periodic properties of the DFT matrix, as the outer parallelization framework. Because butterflies are the core operations of the Cooley-Tukey algorithm

    更新日期:2020-04-08
  • Gender-specific behavior change following terror attacks
    arXiv.cs.SI Pub Date : 2020-04-06
    Jonas S. Juul; Laura Alessandretti; Jesper Dammeyer; Ingo Zettler; Sune Lehmann; Joachim Mathiesen

    Terrorists use violence in pursuit of political goals. While terror often has severe consequences for victims, it remains an open question how terror attacks affect the general population. We study the behavioral response of citizens of cities affected by $7$ different terror attacks. We compare real-time mobile communication patterns in the first $24$ hours following a terror attack to the corresponding

    更新日期:2020-04-08
  • On the Persistence of Persistent Identifiers of the Scholarly Web
    arXiv.cs.SI Pub Date : 2020-04-06
    Martin Klein; Lyudmila Balakireva

    Scholarly resources, just like any other resources on the web, are subject to reference rot as they frequently disappear or significantly change over time. Digital Object Identifiers (DOIs) are commonplace to persistently identify scholarly resources and have become the de facto standard for citing them. We investigate the notion of persistence of DOIs by analyzing their resolution on the web. We derive

    更新日期:2020-04-08
  • Graph Distances and Clustering
    arXiv.cs.SI Pub Date : 2020-04-06
    Pierre Miasnikof; Alexander Y. Shestopaloff; Leonidas Pitsoulis; Yuri Lawryshyn

    With a view on graph clustering, we present a definition of vertex-to-vertex distance which is based on shared connectivity. We argue that vertices sharing more connections are closer to each other than vertices sharing fewer connections. Our thesis is centered on the widely accepted notion that strong clusters are formed by high levels of induced subgraph density, where subgraphs represent clusters

    更新日期:2020-04-08
  • The geographic spread of COVID-19 correlates with structure of social networks as measured by Facebook
    arXiv.cs.SI Pub Date : 2020-04-07
    Theresa Kuchler; Dominic Russel; Johannes Stroebel

    We use anonymized and aggregated data from Facebook to show that areas with stronger social ties to two early COVID-19 "hotspots" (Westchester County, NY, in the U.S. and Lodi province in Italy) generally have more confirmed COVID-19 cases as of March 30, 2020. These relationships hold after controlling for geographic distance to the hotspots as well as for the income and population density of the

    更新日期:2020-04-08
  • Statistical properties of telephone communication network
    arXiv.cs.SI Pub Date : 2020-04-07
    V. M. Danilevskiy; V. V. Yanovsky

    The directed network of telephone subscribers is considered in the article. It can be described as a dynamic network with vertices that correspond to the subscribers of the telephone network and emerging directional edges that correspond to the connections between the respective subscribers. The position of the edge and its direction is determined by the incoming and outgoing calls from the corresponding

    更新日期:2020-04-08
  • Discovering associations in COVID-19 related research papers
    arXiv.cs.SI Pub Date : 2020-04-06
    Iztok Fister Jr.; Karin Fister; Iztok Fister

    A COVID-19 pandemic has already proven itself to be a global challenge. It proves how vulnerable humanity can be. It has also mobilized researchers from different sciences and different countries in the search for a way to fight this potentially fatal disease. In line with this, our study analyses the abstracts of papers related to COVID-19 and coronavirus-related-research using association rule text

    更新日期:2020-04-08
  • General Community Detection with Optimal Recovery Conditions for Multi-relational Sparse Networks with Dependent Layers
    arXiv.cs.SI Pub Date : 2020-04-06
    Sharmodeep Bhattacharyya; Shirshendu Chatterjee

    Multilayer and multiplex networks are becoming common network data sets in recent times. We consider the problem of identifying the common community structure for a special type of multilayer networks called multi-relational networks. We consider extensions of the spectral clustering methods for multi-relational networks and give theoretical guarantees that the spectral clustering methods recover community

    更新日期:2020-04-08
  • Routine pattern discovery and anomaly detection in individual travel behavior
    arXiv.cs.SI Pub Date : 2020-04-05
    Lijun Sun; Xinyu Chen; Zhaocheng He; Luis F. Miranda-Moreno

    Discovering patterns and detecting anomalies in individual travel behavior is a crucial problem in both research and practice. In this paper, we address this problem by building a probabilistic framework to model individual spatiotemporal travel behavior data (e.g., trip records and trajectory data). We develop a two-dimensional latent Dirichlet allocation (LDA) model to characterize the generative

    更新日期:2020-04-08
  • A Few Topical Tweets are Enough for Effective User-Level Stance Detection
    arXiv.cs.SI Pub Date : 2020-04-07
    Younes Samih; Kareem Darwish

    Stance detection entails ascertaining the position of a user towards a target, such as an entity, topic, or claim. Recent work that employs unsupervised classification has shown that performing stance detection on vocal Twitter users, who have many tweets on a target, can yield very high accuracy (+98%). However, such methods perform poorly or fail completely for less vocal users, who may have authored

    更新日期:2020-04-08
  • Divergent modes of online collective attention to the COVID-19 pandemic are associated with future caseload variance
    arXiv.cs.SI Pub Date : 2020-04-07
    David Rushing Dewhurst; Thayer Alshaabi; Michael V. Arnold; Joshua R. Minot; Christopher M. Danforth; Peter Sheridan Dodds

    Using a random 10% sample of tweets authored from 2019-09-01 through 2020-03-25, we analyze the dynamic behavior of words (1-grams) used on Twitter to describe the ongoing COVID-19 pandemic. Across 24 languages, we find two distinct dynamic regimes: One characterizing the rise and subsequent collapse in collective attention to the initial Coronavirus outbreak in late January, and a second that represents

    更新日期:2020-04-08
  • Normalised Degree Variance
    arXiv.cs.SI Pub Date : 2018-03-08
    Keith M. Smith; Javier Escudero

    Finding graph indices which are unbiased to network size and density is of high importance both within a given field and across fields for enhancing comparability of modern network science studies. The degree variance is an important metric for characterising network degree heterogeneity. Here, we provide an analytically valid normalisation of degree variance to replace previous normalisations which

    更新日期:2020-04-08
  • Policy Targeting under Network Interference
    arXiv.cs.SI Pub Date : 2019-06-24
    Davide Viviano

    This paper discusses the problem of estimating treatment allocation rules under network interference. I propose a method with several attractive features for applications: (i) it does not rely on the correct specification of a particular structural model; (ii) it exploits heterogeneity in treatment effects for targeting individuals; (iii) it accommodates arbitrary constraints on the policy function

    更新日期:2020-04-08
  • Pandemic Populism: Facebook Pages of Alternative News Media and the Corona Crisis -- A Computational Content Analysis
    arXiv.cs.SI Pub Date : 2020-04-06
    Svenja Boberg; Thorsten Quandt; Tim Schatto-Eckrodt; Lena Frischlich

    The COVID-19 pandemic has not only had severe political, economic, and societal effects, it has also affected media and communication systems in unprecedented ways. While traditional journalistic media has tried to adapt to the rapidly evolving situation, alternative news media on the Internet have given the events their own ideological spin. Such voices have been criticized for furthering societal

    更新日期:2020-04-08
  • Robustness analysis in an inter-cities mobility network: modeling municipal, state and federal initiatives as failures and attacks
    arXiv.cs.SI Pub Date : 2020-04-06
    Vander L. S. Freitas; Jeferson Feitosa; Catia S. N. Sepetauskas; Leonardo B. L. Santos

    Motivated by the challenge related to the COVID-19 epidemic and the seek for optimal containment strategies, we present a robustness analysis into an inter-cities mobility complex network. We abstract municipal initiatives as nodes' failures and the federal actions as targeted attacks. The geo(graphs) approach is applied to visualize the geographical graph and produce maps of topological indexes, such

    更新日期:2020-04-08
  • Characterizing and Modeling Distributed Training with Transient Cloud GPU Servers
    arXiv.cs.PF Pub Date : 2020-04-07
    Shijian Li; Robert J. Walls; Tian Guo

    Cloud GPU servers have become the de facto way for deep learning practitioners to train complex models on large-scale datasets. However, it is challenging to determine the appropriate cluster configuration---e.g., server type and number---for different training workloads while balancing the trade-offs in training time, cost, and model accuracy. Adding to the complexity is the potential to reduce the

    更新日期:2020-04-08
  • The State of Research on Function-as-a-Service Performance Evaluation: A Multivocal Literature Review
    arXiv.cs.PF Pub Date : 2020-04-07
    Joel Scheuner; Philipp Leitner

    Function-as-a-Service (FaaS) is one form of the serverless cloud computing paradigm and is defined through FaaS platforms (e.g., AWS Lambda) executing event-triggered code snippets (i.e., functions). Many studies that empirically evaluate the performance of such FaaS platforms have started to appear but we are currently lacking a comprehensive understanding of the overall domain. In our work, we survey

    更新日期:2020-04-08
  • Methods and Techniques for Dynamic Deployability of Software-Defined Security Services
    arXiv.cs.NI Pub Date : 2020-04-04
    Roberto Doriguzzi-Corin

    With the recent trend of "network softwarisation", enabled by emerging technologies such as Software-Defined Networking (SDN) and Network Function Virtualisation (NFV), system administrators of data centres and enterprise networks have started replacing dedicated hardware-based middleboxes with virtualised network functions running on servers and end hosts. This radical change has facilitated the provisioning

    更新日期:2020-04-08
  • 5G Radio Access Network Architecture for Terrestrial Broadcast Services
    arXiv.cs.NI Pub Date : 2020-04-07
    Mikko Säily; Carlos Barjau Estevan; Jordi Joan Gimenez; Fasil Tesema; Wei Guo; David Gomez-Barquero; De Mi

    The 3rd Generation Partnership Project (3GPP) has defined based on the Long Term Evolution (LTE) enhanced Multicast Broadcast Multimedia Service (eMBMS) a set of new features to support the distribution of Terrestrial Broadcast services in Release 14. On the other hand, a new 5th Generation (5G) system architecture and radio access technology, 5G New Radio (NR), are being standardised from Release

    更新日期:2020-04-08
  • First Experiments with a 5G-Connected Drone
    arXiv.cs.NI Pub Date : 2020-04-07
    Raheeb Muzaffar; Christian Raffelsberger; Aymen Fakhreddine; José López Luque; Driton Emini; Christian Bettstetter

    We perform experiments on the wireless communication between a drone flying at different heights and a commercial 5G base station. An Android-based tool deployed on a 5G test platform is used to record radio link parameters in the up- and downlink. In the downlink, measurements show a throughput of 600 Mbit/s on average with peaks above 700 Mbit/s. The uplink has a much lower throughput, comparable

    更新日期:2020-04-08
  • DiagNet: towards a generic, Internet-scale root cause analysis solution
    arXiv.cs.NI Pub Date : 2020-04-07
    Loïck BonniotWIDE; Christoph NeumannWIDE; François TaïaniWIDE

    Diagnosing problems in Internet-scale services remains particularly difficult and costly for both content providers and ISPs. Because the Internet is decentralized, the cause of such problems might lie anywhere between an end-user's device and the service datacenters. Further, the set of possible problems and causes is not known in advance, making it impossible in practice to train a classifier with

    更新日期:2020-04-08
  • CellOS: Zero-touch Softwarized Open Cellular Networks
    arXiv.cs.NI Pub Date : 2020-04-07
    Leonardo Bonati; Salvatore D'Oro; Lorenzo Bertizzolo; Emrecan Demirors; Zhangyu Guan; Stefano Basagni; Tommaso Melodia

    Operational cellular networks rely on closed and inflexible infrastructure tightly controlled by a handful of vendors. As a consequence, configuration requires vendor support and lengthy manual operations, which prevent Telco Operators (TOs) from unlocking the full network potential and from being able to perform fine grained performance optimization, especially on a per-user basis. To address this

    更新日期:2020-04-08
Contents have been reproduced by permission of the publishers.
导出
全部期刊列表>>
聚焦肿瘤,探索癌症
欢迎探索2019年最具下载量的材料科学论文
宅家赢大奖
向世界展示您的会议墙报和演示文稿
全球疫情及响应:BMC Medicine专题征稿
新版X-MOL期刊搜索和高级搜索功能介绍
化学材料学全球高引用
ACS材料视界
x-mol收录
自然科研论文编辑服务
南方科技大学
南方科技大学
舒伟
中国科学院长春应化所于聪-4-8
复旦大学
课题组网站
X-MOL
香港大学化学系刘俊治
中山大学化学工程与技术学院
试剂库存
天合科研
down
wechat
bug