Search results for: CUBIC%20GRAPH - Bridge of Knowledge

Search

Search results for: CUBIC%20GRAPH

Filters

total: 520
filtered: 395

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: CUBIC%20GRAPH

  • Eventual Convergence of the Reputation-Based Algorithm in IoT Sensor Networks

    Publication

    - SENSORS - Year 2021

    Uncertainty in dense heterogeneous IoT sensor networks can be decreased by applying reputation-inspired algorithms, such as the EWMA (Exponentially Weighted Moving Average) algorithm, which is widely used in social networks. Despite its popularity, the eventual convergence of this algorithm for the purpose of IoT networks has not been widely studied, and results of simulations are often taken in lieu of the more rigorous proof....

    Full text available to download

  • Synchronous black hole search in directed graphs

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2011

    The paper considers a team of robots which has to explore a graph G, where some nodes can be harmful. Robots are initially located at the so-called home base node. The dangerous nodes are the so-called black hole nodes, and once a robot enters in one of them, it is destroyed. The goal is to find a strategy in order to explore G in such a way that minimum number of robots is wasted. The exploration ends if there is at least one...

    Full text available to download

  • A model, design, and implementation of an efficient multithreaded workflow execution engine with data streaming, caching, and storage constraints

    Publication

    The paper proposes a model, design, and implementation of an efficient multithreaded engine for execution of distributed service-based workflows with data streaming defined on a per task basis. The implementation takes into account capacity constraints of the servers on which services are installed and the workflow data footprint if needed. Furthermore, it also considers storage space of the workflow execution engine and its cost....

    Full text available to download

  • The computational complexity of the backbone coloring problem for planar graphs with connected backbones

    In the paper we study the computational complexity of the backbone coloring problem for planar graphs with connected backbones. For every possible value of integer parameters λ≥2 and k≥1 we show that the following problem: Instance: A simple planar graph GG, its connected spanning subgraph (backbone) HH. Question: Is there a λ-backbone coloring c of G with backbone H such that maxc(V(G))≤k? is either NP-complete or polynomially...

    Full text available to download

  • Wpływ struktur wsparcia na efektywność nauczania języka pisanego w środowisku e-learningowym

    Publication

    The process of knowledge and language skills development during an online course can be very effective if student engagement in learning is achieved. This can be attained by introducing general and specific support mechanisms prior to the commencement of the course and during it. The former relates to the technological aspect, that is to familiarizing students with the functionalities of the virtual learning environment they will...

  • Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting

    Publication

    - Year 2019

    NDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...

    Full text available to download

  • Modele i algorytmy dla grafowych struktur defensywnych

    Publication

    - Year 2023

    W niniejszej pracy przeprowadzono analizę złożoności istnienia struktur defensywnych oraz równowag strategicznych w grafach. W przypadku struktur defensywnych badano modele koalicji defensywnych, zbiorów defensywnych i koalicji krawędziowych – każdy z nich w wersji globalnej, tj. z wymogiem dominacji całego grafu. W przypadku modeli równowagi strategicznej badano równowagę strategiczną koalicji defensywnych, równowagę strategiczną...

    Full text available to download

  • Interoperability Constraints in Service Selection Algorithms

    Publication

    - Year 2012

    In Service Oriented Architecture, composite applications are developed by integration of existing, atomic services that may be available in alternative versions realizing the same functionality but having different Quality of Service (QoS) attributes. The development process requires effective service selection algorithms that balance profits and constraints of QoS attributes. Additionally, services operate in a heterogeneous environment,...

  • Scanning networks with cactus topology

    Publication
    • Ł. Wrona

    - Year 2008

    The family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...

  • Comparison of selected algorithms for scheduling workflow applications with dynamically changing service availability

    This paper compares the quality and execution times of several algorithms for scheduling service based workflow applications with changeable service availability and parameters. A workflow is defined as an acyclic directed graph with nodes corresponding to tasks and edges to dependencies between tasks. For each task, one out of several available services needs to be chosen and scheduled to minimize the workflow execution time and...

    Full text to download in external service

  • Three levels of fail-safe mode in MPI I/O NVRAM distributed cache

    The paper presents architecture and design of three versions for fail-safe data storage in a distributed cache using NVRAM in cluster nodes. In the first one, cache consistency is assured through additional buffering write requests. The second one is based on additional write log managers running on different nodes. The third one benefits from synchronization with a Parallel File System (PFS) for saving data into a new file which...

    Full text available to download

  • Combining Road Network Data from OpenStreetMap with an Authoritative Database

    Computer modeling of road networks requires detailed and up-to-date dataset. This paper proposes a method of combining authoritative databases with OpenStreetMap (OSM) system. The complete route is established by finding paths in the graph constructed from partial data obtained from OSM. In order to correlate data from both sources, a method of coordinate conversion is proposed. The algorithm queries road data from OSM and provides...

    Full text available to download

  • The computational complexity of the backbone coloring problem for bounded-degree graphs with connected backbones

    Given a graph G, a spanning subgraph H of G and an integer λ>=2, a λ-backbone coloring of G with backbone H is a vertex coloring of G using colors 1, 2, ..., in which the color difference between vertices adjacent in H is greater than or equal to lambda. The backbone coloring problem is to find such a coloring with maximum color that does not exceed a given limit k. In this paper, we study the backbone coloring problem for bounded-degree...

    Full text to download in external service

  • A Model of Thermal Energy Storage According to the Convention of Bond Graphs (BG) and State Equations (SE)

    The main advantage of the use of the Bond Graphs method and State Equations for modeling energy systems with a complex structure (marine power plants, hybrid vehicles, etc.) is the ability to model the system components of different physical nature using identical theoretical basis. The paper presents a method of modeling thermal energy storage, which is in line with basic BG theory. Critical comments have been put forward concerning...

    Full text available to download

  • The Backbone Coloring Problem for Bipartite Backbones

    Let G be a simple graph, H be its spanning subgraph and λ≥2 be an integer. By a λ -backbone coloring of G with backbone H we mean any function c that assigns positive integers to vertices of G in such a way that |c(u)−c(v)|≥1 for each edge uv∈E(G) and |c(u)−c(v)|≥λ for each edge uv∈E(H) . The λ -backbone chromatic number BBCλ(G,H) is the smallest integer k such that there exists a λ -backbone coloring c of G with backbone H satisfying...

    Full text to download in external service

  • COMPUTER-AIDED CONSTRUCTION AT DESIGNING REINFORCED CONCRETE COLUMNS AS PER EC

    The article presents the author’s computer program for designing and dimensioning columns in reinforced concrete structures taking into account phenomena affecting their behaviour and information referring to design as per EC. The computer program was developed with the use of C++ programming language. The program guides the user through particular dimensioning stages: from introducing basic data such as dimensions, concrete...

    Full text available to download

  • Cops, a fast robber and defensive domination on interval graphs

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2019

    The game of Cops and ∞-fast Robber is played by two players, one controlling c cops, the other one robber. The players alternate in turns: all the cops move at once to distance at most one each, the robber moves along any cop-free path. Cops win by sharing a vertex with the robber, the robber by avoiding capture indefinitely. The game was proposed with bounded robber speed by Fomin et al. in “Pursuing a fast robber on a graph”,...

    Full text available to download

  • Planning optimised multi-tasking operations under the capability for parallel machining

    The advent of advanced multi-tasking machines (MTMs) in the metalworking industry has provided the opportunity for more efficient parallel machining as compared to traditional sequential processing. It entailed the need for developing appropriate reasoning schemes for efficient process planning to take advantage of machining capabilities inherent in these machines. This paper addresses an adequate methodical approach for a non-linear...

    Full text available to download

  • Path-based methods on categorical structures for conceptual representation of wikipedia articles

    Machine learning algorithms applied to text categorization mostly employ the Bag of Words (BoW) representation to describe the content of the documents. This method has been successfully used in many applications, but it is known to have several limitations. One way of improving text representation is usage of Wikipedia as the lexical knowledge base – an approach that has already shown promising results in many research studies....

    Full text available to download

  • Synteza bezczujnikowego sterowania maszyną indukcyjną klatkową zasilaną z falownika prądu

    Publication

    - Year 2016

    Synteza bezczujnikowego sterowania maszyną indukcyjną klatkową zasilaną z falownika prądu stanowi cel niniejszej monografii. Praca zawiera podstawowe informacje na temat modelowania układu napędowego z maszyną indukcyjną klatkową zasilaną z falownika prądu. Przedstawiono informacje na temat linearyzacji nieliniowych obiektów. Na pod-stawie metody syntezy strukturalnej opracowano nowe transformacje do postaci zmien-nych multiskalarnych,...

  • Comparison and Analysis of Service Selection Algorithms

    Publication

    - Year 2013

    In Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...

  • Towards More Realistic Probabilistic Models for Data Structures: The External Path Length in Tries under the Markov Model

    Publication

    - Year 2013

    Tries are among the most versatile and widely used data structures on words. They are pertinent to the (internal) structure of (stored) words and several splitting procedures used in diverse contexts ranging from document taxonomy to IP addresses lookup, from data compression (i.e., Lempel- Ziv'77 scheme) to dynamic hashing, from partial-match queries to speech recognition, from leader election algorithms to distributed hashing...

  • Generating optimal paths in dynamic environments using RiverFormation Dynamics algorithm

    The paper presents a comparison of four optimisation algorithms implemented for the purpose of finding the shortest path in static and dynamic environments with obstacles. Two classical graph algorithms –the Dijkstra complete algorithm and A* heuristic algorithm – were compared with metaheuristic River Formation Dynamics swarm algorithm and its newly introduced modified version. Moreover, another swarm algorithm has been compared...

    Full text to download in external service

  • KernelHive: a new workflow-based framework for multilevel high performance computing using clusters and workstations with CPUs and GPUs

    The paper presents a new open-source framework called KernelHive for multilevel parallelization of computations among various clusters, cluster nodes, and finally, among both CPUs and GPUs for a particular application. An application is modeled as an acyclic directed graph with a possibility to run nodes in parallel and automatic expansion of nodes (called node unrolling) depending on the number of computation units available....

    Full text to download in external service

  • Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects

    Safety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...

    Full text to download in external service

  • The maximum edge-disjoint paths problem in complete graphs

    Publication

    Rozważono problem ścieżek krawędziowo rozłącznych w grafach pełnych. Zaproponowano wielomianowe algorytmy: 3.75-przybliżony (off-line) oraz 6.47-przybliżony (on-line), poprawiając tym samym wyniki wcześniej znane z literatury [P. Carmi, T. Erlebach, Y. Okamoto, Greedy edge-disjoint paths in complete graphs, in: Proc. 29th Workshop on Graph Theoretic Concepts in Computer Science, in: LNCS, vol. 2880, 2003, pp. 143-155]. Ponadto...

    Full text available to download

  • New Performance Indices for Power System Stabilizers

    Publication

    - ENERGIES - Year 2022

    The subject of the article is issues related to innovative indices for power system stabilizers (PSSs). These new indices will be able to quickly show which PSS (among many other PSSs) is not working properly and that advanced optimization and simulation methods should be used to improve the PSS settings. The authors note the fact that the acceptance requirements for PSSs are different in various power systems. Moreover, the authors...

    Full text available to download

  • Communication and Load Balancing Optimization for Finite Element Electromagnetic Simulations Using Multi-GPU Workstation

    This paper considers a method for accelerating finite-element simulations of electromagnetic problems on a workstation using graphics processing units (GPUs). The focus is on finite-element formulations using higher order elements and tetrahedral meshes that lead to sparse matrices too large to be dealt with on a typical workstation using direct methods. We discuss the problem of rapid matrix generation and assembly, as well as...

    Full text to download in external service

  • Method of evaluation of lubricating ability of lube oils and fuels in energetistic formulation

    Publication

    The paper presents an interpretation of operation of a boundary layer of a lubricating medium. A model of the homogeneous Poisson process has been proposed to assess the deterioration process of the layer's operation. The assessment considers the original interpretation of operation of a boundary layer, as a lubricity measure of a boundary layer of any lubricant. In the submitted proposal the operation of a boundary layer is understood...

    Full text available to download

  • Experimental and theoretical investigation of conformational states and noncovalent interactions in crystalline sulfonamides with a methoxyphenyl moiety

    Publication

    - CRYSTENGCOMM - Year 2021

    Four sulfonamide derivatives with a methoxyphenyl moiety, namely N-{4-[(2-methoxyphenyl)sulfamoyl] phenyl}acetamide (1a), N-{4-[(3-methoxyphenyl)sulfamoyl]phenyl}acetamide (1b), 4-amino-N-(2- methoxyphenyl)benzenesulfonamide (2a) and 4-amino-N-(3-methoxyphenyl)benzenesulfonamide (2b), have been synthesized and characterized physiochemically by CHNS, MS, FT-IR, 1H NMR, 13C NMR, PXRD and TG methods. Crystal structures were determined...

    Full text to download in external service

  • Stereo vision with Equal Baseline Multiple Camera Set (EBMCS) for obtaining depth maps of plants

    This paper presents a method of improving the estimation of distances between an autonomous harvesting robot and plants with ripe fruits by using the vision system based on five cameras. The system is called Equal Baseline Multiple Camera Set (EBMCS). EBMCS has some features of a camera matrix and a camera array. EBMCS is regarded as a set of stereo cameras for estimating distances by obtaining disparity maps and depth maps. This...

    Full text to download in external service

  • Collision-Free Network Exploration

    Publication
    • J. Czyzowicz
    • D. Dereniowski
    • L. Gąsieniec
    • R. Klasing
    • A. Kosowski
    • D. Pająk

    - Year 2014

    A set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...

    Full text to download in external service

  • Detecting type of hearing loss with different AI classification methods: a performance review

    Publication
    • M. Kassjański
    • M. Kulawiak
    • T. Przewoźny
    • D. Tretiakow
    • J. Kuryłowicz
    • A. Molisz
    • K. Koźmiński
    • A. Kwaśniewska
    • P. Mierzwińska-Dolny
    • M. Grono

    - Year 2023

    Hearing is one of the most crucial senses for all humans. It allows people to hear and connect with the environment, the people they can meet and the knowledge they need to live their lives to the fullest. Hearing loss can have a detrimental impact on a person's quality of life in a variety of ways, ranging from fewer educational and job opportunities due to impaired communication to social withdrawal in severe situations. Early...

    Full text to download in external service

  • Scheduling on Uniform and Unrelated Machines with Bipartite Incompatibility Graphs

    Publication

    - Year 2022

    The problem of scheduling jobs on parallel machines under an incompatibility relation is considered in this paper. In this model, a binary relation between jobs is given and no two jobs that are in the relation can be scheduled on the same machine. We consider job scheduling under the incompatibility relation modeled by a bipartite graph, under the makespan optimality criterion, on uniform and unrelated machines. Unrelated machines...

    Full text to download in external service

  • Clonal selection in discrete optimization

    Publication

    - Year 2009

    W rozprawie zajmujemy się efektywnymi metodami przybliżonego rozwiązywania problemów optymalizacji dyskretnej, a w szczególności algorytmami opartymi na metodzie selekcji klonalnej (SK), należącymi do kategorii sztucznych systemów immunologicznych. Techniki optymalizacji to znaczące pole badań w informatyce, a niektóre ze starszych technik, takie jak algorytmy genetyczne, symulowane wyżarzanie czy przeszukiwanie tabu, stały się...

  • Multi-Criteria Approach in Multifunctional Building Design Process

    Publication

    - Year 2017

    The paper presents new approach in multifunctional building design process. Publication defines problems related to the design of complex multifunctional buildings. Currently, contemporary urban areas are characterized by very intensive use of space. Today, buildings are being built bigger and contain more diverse functions to meet the needs of a large number of users in one capacity. The trends show the need for recognition of...

    Full text to download in external service

  • Algorytm ekstrakcji cech biometrycznych twarzy

    Publication

    W referacie zawarto opis metody automatycznej lokalizacji oraz parametryzacji punktów charakterystycznych w obrazie twarzy. Do lokalizacji punktów charakterystycznych wykorzystano zmodyfikowany algorytm EBGM (ang. Elastic Bunch Graph Matching). Algorytm ten pozwala lokalizować punkty w obrazie przy założeniu niezmienności topologii grafu połączeń między nimi.W referacie przedstawiono podstawy teoretyczne metody oraz zaimplementowany...

  • Total Completion Time Minimization for Scheduling with Incompatibility Cliques

    Publication

    - Year 2021

    This paper considers parallel machine scheduling with incompatibilities between jobs. The jobs form a graph equivalent to a collection of disjoint cliques. No two jobs in a clique are allowed to be assigned to the same machine. Scheduling with incompatibilities between jobs represents a well-established line of research in scheduling theory and the case of disjoint cliques has received increasing attention in recent...

    Full text to download in external service

  • SMART SHOP SERVICES FOR BUILDING CUSTOMER-ORIENTED SCENARIOS

    Publication

    The shops of today mostly support the customer by offering him or her products based on basic relationships between products viewed or ordered by users with similar tastes. This common approach may fail in many cases especially when the user does not have sufficient knowledge about the market, or when he or she wants to build a set of products in more than one shop. New categories of smart shop services are proposed in order to...

    Full text available to download

  • A Framework for Searching in Graphs in the Presence of Errors

    Publication

    - Year 2019

    We consider a problem of searching for an unknown target vertex t in a (possibly edge-weighted) graph. Each vertex-query points to a vertex v and the response either admits that v is the target or provides any neighbor s of v that lies on a shortest path from v to t. This model has been introduced for trees by Onak and Parys [FOCS 2006] and for general graphs by Emamjomeh-Zadeh et al. [STOC 2016]. In the latter, the authors provide...

    Full text to download in external service

  • Brief Announcement: Energy Constrained Depth First Search

    Publication

    - Year 2018

    Depth first search is a natural algorithmic technique for constructing a closed route that visits all vertices of a graph. The length of such route equals, in an edge-weighted tree, twice the total weight of all edges of the tree and this is asymptotically optimal over all exploration strategies. This paper considers a variant of such search strategies where the length of each route is bounded by a positive integer B (e.g. due...

    Full text to download in external service

  • Scheduling of compatible jobs on parallel machines

    Publication

    - Year 2021

    The dissertation discusses the problems of scheduling compatible jobs on parallel machines. Some jobs are incompatible, which is modeled as a binary relation on the set of jobs; the relation is often modeled by an incompatibility graph. We consider two models of machines. The first model, more emphasized in the thesis, is a classical model of scheduling, where each machine does one job at time. The second one is a model of p-batching...

  • Agent-based social network as a simulation of a market behaviour

    Publication

    - Year 2010

    Recent years and the outbreak of world's economic crisis in 2008 proved the crucial importance of reliable analysis of market dynamics. However, werarely apply models of proper detail level (the global prosperity forecast of 2007 can be seen as a grim proof). The behaviour of individuals and companies is far from being ideal and rational. Many claims that the economic paradigm of rational expectations (coming from J. Muth and R....

  • Observation of a new boson at a mass of 125 GeV with the CMS experiment at the LHC

    Publication
    • S. Chatrchyan
    • V. Khachatryan
    • A. Sirunyan
    • A. Tumasyan
    • W. Adam
    • E. Aguilo
    • T. Bergauer
    • M. Dragicevic
    • J. Erö
    • C. Fabjan... and 2847 others

    - PHYSICS LETTERS B - Year 2012

    Full text to download in external service

  • A New Boson with a Mass of 125 GeV Observed with the CMS Experiment at the Large Hadron Collider

    Publication
    • D. Abbaneo
    • G. Abbiendi
    • M. Abbrescia
    • S. Abdullin
    • A. Abdulsalam
    • B. Acharya
    • D. Acosta
    • J. Acosta
    • A. Adair
    • W. Adam... and 2853 others

    - SCIENCE - Year 2012

    Full text to download in external service