Browsing by Subject "Algorithms"
Now showing items 120 of 114

Agent placement in wireless embedded systems: Memory space and energy optimizations
(2010)Embedded applications can be structured in terms of mobile agents that are flexibly installed on available nodes. In wireless systems, such nodes typically have limited battery and memory resources; therefore it is important ... 
Algorithms for optimization of building design: A review
(2014)Building design is quite a complicated task with the design team trying to counterbalance various antagonistic parameters, which in turn are subject to various constraints. Due to this complexity, performance simulation ... 
Ant colony optimization and data mining: Techniques and trends
(2010)The Ant Colony Optimization (ACO) technique was inspired by the ants' behaviour throughout their exploration for food. The use of this technique has been very successful for several problems. Besides, Data Mining (DM) has ... 
Assessing multiplegroup diagnostic problems with multidimensional receiver operating characteristic surfaces: Application to proton MR Spectroscopy (MRS) in HIVrelated neurological injury
(2008)We present the multidimensional Receiver Operating Characteristic (ROC) surface, a plot of the true classification rates of tests based on levels of biological markers, for multigroup discrimination, as an extension of ... 
Bayesian uncertainty quantification of turbulence models based on highorder adjoint
(2015)The uncertainties in the parameters of turbulence models employed in computational fluid dynamics simulations are quantified using the Bayesian inference framework and analytical approximations. The posterior distribution ... 
Biologicalinspired algorithms for dynamic search in web graphs
(2011)We propose a biologicalinspired algorithmic procedure for improving the precision level in respect to a web user's query. This algorithm is capable of tracing relevant information in web graphs, imitating the mission of ... 
Black hole search and exploration in unoriented tori with synchronous scattered finite automata
(2012)We consider the problem of locating a black hole in a synchronous, anonymous, and unoriented torus network using mobile agents. A black hole is a harmful network node that destroys any agent visiting it without leaving any ... 
Broadcast erasure channel with feedbackcapacity and algorithms
(2009)We consider the twouser broadcast erasure channel where feedback in the form of ack messages is fed back to the transmitter. We provide an upper bound to the capacity region of this system. We then present two algorithms ... 
Capacityachieving encoding for the broadcast erasure channel with multiple users
(2011)We consider the Nuser memoryless broadcast erasure channel with N unicast sessions (one for each user) where receiver feedback is sent to the transmitter in the form of ACK/NACK messages. We first provide a generic outer ... 
A chanceconstrained based stochastic dynamic traffic assignment model: Analysis, formulation and solution algorithms
(2006)This paper is concerned with the system optimumdynamic traffic assignment (SODTA) problem when the timedependent demands are random variables with known probability distributions. The model is a stochastic extension of ... 
Classification of dermatological images using advanced clustering techniques
(2010)Computer visionbased diagnosis systems have been widely used in dermatology, aiming at the early detection of skin cancer and more specifically the recognition of malignant melanoma tumor. This paper proposes a novel ... 
Column generation for scheduling shipments within a supply chain network with the minimum number of vehicles
(2014)We consider the problem of scheduling a set of shipments between different nodes of a supply chain network. Each shipment has a fixed departure time, as well as an origin and a destination node, which, combined, determine ... 
A comparable study employing weka clustering/classification algorithms for web page classification
(2011)Documents and web pages share many similarities. Thus classification methods used in documents can be applied to advanced web content, with or even without modifications. Algorithms for document and web classification are ... 
Control and optimization meet the smart power grid: Scheduling of power demands for optimal energy management
(2012)The smart power grid harnesses information and communication technologies to enhance reliability and enforce sensible use of energy through effective management of demand load. We envision a scenario with realtime ... 
Crosslayer power control in wireless networks
(2006)We introduce a power control algorithm that exploits queue length information to achieve maximum data throughput in singlehop CDMA wireless networks. The algorithm operates in realtime, i.e., executes a single iteration ... 
A delay based optimization scheme for peak load reduction in the smart grid
(2012)A measurement campaign based on commodity wireless sensors shows that the majority of thermostatic loads in a user premise are described by periodic pulse waves. The superposition of these loads results to high peak power ... 
Delineation and interpretation of gene networks towards their effect in cellular physiology a reverse engineering approach for the identification of critical molecular players, through the use of ontologies
(2010)Exploiting ontologies, provides clues regarding the involvement of certain molecular processes in the cellular phenotypic manifestation. However, identifying individual molecular actors (genes, proteins, etc.) for targeted ... 
A demonstration of a relaying selection scheme for maximizing a diamond network's throughput
(2012)We demonstrate a queueaware algorithm studied in a diamond network topology. This algorithm's decisions are obtained from an analytical optimization framework relying on our technical work [4] and we devise an implementation ... 
Design of micro distribution systems consisting of long channels with arbitrary cross sections
(2012)Gas flows through long microchannels of various cross sections have been extensively investigated over the years both numerically and experimentally. In various technological applications including microfluidics, these ... 
Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers
(2007)Selfish behavior at the Medium Access (MAC) Layer can have devastating side effects on the performance of wireless networks, with effects similar to those of Denial of Service (DoS) attacks. In this paper we consider the ...