260,441 Hits in 6.7 sec

Efficient Algorithms and Performance Results for Multi-User Knowledge Bases

Vinay K. Chaudhri, John Mylopoulos
1995 International Joint Conference on Artificial Intelligence  
The paper describes research efforts to develop efficient implementation techniques for large, shared knowledge bases, focusing on efficient concurrent access of large knowledge bases by multiple users  ...  The implementation of the policy and exper imental evaluation results are also presented and discussed. The paper concludes with dis cussion on l essons learnt from this research.  ...  One of the requirements of such tools is that they ac commodate efficient multi-user access of a single, large knowledge base by maximizing throughput, i.e., the number of user-defined transactions that  ... 
dblp:conf/ijcai/ChaudhriM95 fatcat:oltorx556zfmbepabqcghxxb6a

Decentralized Knowledge and Learning in Strategic Multi-user Communication [article]

Yi Su, Mihaela van der Schaar
2008 arXiv   pre-print
other users and the environment., The emerging interaction among users and their resulting performance in the paradigm is driven not only by the users' ability to efficiently adapt their transmission  ...  Value of Learning, Information, and Observations As mentioned previously, the performance of a learning algorithm can be quantified based on the resulting payoffs obtained by users.  ... 
arXiv:0804.2831v1 fatcat:6y5bafpbvfgdfaprl5d4qvzaky

Time Variant Multi Perspective Hierarchical Clustering Algorithm for Predicting Student Interest in Sports Mining

2019 International journal of recent technology and engineering  
Based on the value of SSS, the method identifies the user interest. Similarly, the interest of the student at each time window has been identified and used to generate the knowledge.  ...  Towards performance development, a novel time variant multi perspective hierarchical clustering approach towards user interest prediction.  ...  RESULTS AND DISCUSSION The proposed time variant multi perspective hierarchical clustering algorithm and interest prediction method is hard coded. Its performance is evaluated in various conditions.  ... 
doi:10.35940/ijrte.d5291.118419 fatcat:s5g5u5nfmfb7tgfnw7z4ko5eay

Specifying Mining Algorithms with Iterative User-Defined Aggregates: A Case Study [chapter]

Fosca Giannotti, Giuseppe Manco, Franco Turini
2001 Lecture Notes in Computer Science  
As a case study, the paper presents user-defined aggregates for specifying a version of the apriori algorithm.  ...  Some performance analyses and comparisons are discussed in order to show the effectiveness of the approach.  ...  The capability of specifying (and efficiently computing) aggregates is very important in order to provide a basis of a logic-based knowledge discovery support environment.  ... 
doi:10.1007/3-540-44794-6_11 fatcat:cxyyqyanw5eurj2ylg4sem6hai

Performance evaluation of layer adaptive multi-user scheduling in LTE-A downlink

Li Zhang, S. Peter, Chunye Wang
2012 7th International Conference on Communications and Networking in China  
In this paper we evaluate the performance of a specific multi-user scheduling algorithm, which selects users one by one with greedy search and results in a scheduled user set with adaptive size.  ...  The performance is compared with traditional two-user scheduling algorithm in single-cell, and we also show the performance of Coordinated Multi-Point transmission with the layer adaptive algorithm by  ...  From the results it can be seen that multi-user MIMO with MU-LA can lead to more than 30% throughput gain for both average and coverage, with ideal channel knowledge.  ... 
doi:10.1109/chinacom.2012.6417591 dblp:conf/chinacom/0012PW12 fatcat:jp6vhejbhrcyndjiob42hx5n7m

Class Based Multi Stage Encryption for Efficient Data Security in Cloud Environment Using Profile Data

Mouleeswaran S.K., Kanya Devi J, Illayaraja
2019 International Journal of Computer Communication and Informatics  
There are number of approaches presented earlier towards performance in data security in cloud. To overcome the issues, a class based multi stage encryption algorithm is presented in this paper.  ...  The proposed algorithm improves the performance of security and improves the data security.  ...  Results and Discussion: The class based multi stage encryption algorithm for improved data security has been implemented and evaluated for its efficiency.  ... 
doi:10.34256/ijcci1915 fatcat:kt2k3g4a5ndidoy7fwyxgbl66e

Compressive Sensing Multi-User Detection for MC-CDMA System in Machine to Machine Communication

Xu-ping ZHAI, Nan ZHANG, Lei GONG
2018 DEStech Transactions on Computer Science and Engineering  
To relieve control signal overhead lead by massive access during M2M communication, we use greedy algorithm from the field of CS to perform joint Multi-User (MUD) detection of activity and data by taking  ...  The simulation results show that it is effective in recovering sparse input signals as well as gaining higher spectral efficiency.  ...  Acknowledgement This work was supported by the National Natural Science Foundation of China [grant no. 61171085 and 61401266].  ... 
doi:10.12783/dtcse/wcne2017/19797 fatcat:q5zhv633i5b5hoy7qbsrijfxzm

Online multi-task collaborative filtering for on-the-fly recommender systems

Jialei Wang, Steven C.H. Hoi, Peilin Zhao, Zhi-Yong Liu
2013 Proceedings of the 7th ACM conference on Recommender systems - RecSys '13  
Traditional batch model-based Collaborative Filtering (CF) approaches typically assume a collection of users' rating data is given a priori for training the model.  ...  In this paper, we investigate a novel efficient and scalable online collaborative filtering technique for on-the-fly recommender systems, which is able to effectively online update the recommendation model  ...  based on the data observed, which could save the memory and make the algorithm more efficient.  ... 
doi:10.1145/2507157.2507176 dblp:conf/recsys/WangHZL13 fatcat:ka6kfyj3ivgnhf3a5rcin4oita

Emerging Air Interfaces and Management Technologies for the 5G era

Panagiotis Demestichas, Emmanuel Protonotarios, Bernard Barani, Didier Bourse, Victor C. M. Leung
2017 EURASIP Journal on Wireless Communications and Networking  
The most recent research activities focus on the development of 5G communications and networks, aiming to be fully available for the consumers through their devices by 2020.  ...  The scope of this Special Issue is to focus on aspects like 5G communications and networks technologies and more specifically Air Interfaces and Management Technologies.  ...  This algorithm is compared to state-of-the-art channel assignment algorithm. Results show an increase of performance, e.g., in terms of throughput and air interface latency.  ... 
doi:10.1186/s13638-017-0973-5 fatcat:oymgbxdvh5fbhpi26zfqaz6g54

Recommendation Systems Based on Association Rule Mining for a Target Object by Evolutionary Algorithms

Hossein Hatami Varzaneh, Behzad Soleimani Neysiani, Hassan Ziafat, Nasim Soltani
2018 Emerging Science Journal  
In the first step Apriori-based algorithm will be introduced which is used for recommendation systems and then the Particle Swarm Optimization algorithm will be described and the issues of these 2 work  ...  In this field, numerous researches have been done using associative rules for recommendation systems to improve accuracy but runtime of rule-based recommendation systems is high and cannot be used in the  ...  Page | 101 • Knowledge-Based[5]: the recommender systems based on knowledge record knowledge about users, items, one specific item, and needs of the specific user. • Memory-Based[6]: one database from  ... 
doi:10.28991/esj-2018-01133 fatcat:k665o3q3xrfy7kprhvcgwna2ai

Design of Multi-level Teaching System Based on Association Rule Mining

Hong-yan He, Hui-ping, Zhang, Hong-fang Luo
2016 International Journal of Emerging Technologies in Learning (iJET)  
In order to improve the overall performance for the multi-level teaching system, a system with Multi-strata teaching is designed.  ...  It divides the whole class into smaller parts based on their knowledge level and learning ability and teach students in accordance with their aptitude.  ...  The central part of this system lies in the mining module, for it concerns the Mining Algorithm and users can gain knowledge they need in this system.  ... 
doi:10.3991/ijet.v11i11.6252 fatcat:egecwdhn6zffblgqfoxbeszrmq

An Efficient and Usable Multi-show Non-transferable Anonymous Credential System [chapter]

Giuseppe Persiano, Ivan Visconti
2004 Lecture Notes in Computer Science  
In an anonymous credential system a user can prove anonymously the possession of credentials to a service provider. Multi-show and non-transferability are two important properties of such systems.  ...  In this paper we give a construction for multi-show non-transferable credentials for which the owner can prove that the credentials satisfy access control policies expressed by means of linear boolean  ...  For all efficient algorithms A, for all constants η and for all sufficiently large k Succ A (k) ≤ k −η .  ... 
doi:10.1007/978-3-540-27809-2_21 fatcat:j4apck3ztbhqta754b6mtwq2i4

A Survey on Soft Computing Techniques for Spectrum Sensing in a Cognitive Radio Network

Geoffrey Eappen, T Shankar
2020 SN Computer Science  
The wireless telecommunication consumers rely on bulk data, and massive growth in the number of users has resulted in the spectrum congestion.  ...  A CRN, therefore, plays a significant role in the field of wireless communication, and an efficient spectrum sensing enhances the effectiveness of the CRN.  ...  Information stored in the knowledge base are the deductive knowledge or the knowledge gained via user experience.  ... 
doi:10.1007/s42979-020-00372-z fatcat:jk3gcvhp3batdgwyc47hv7y54e

The simulation-based multi-objective evolutionary optimization (SIMEON) framework

Ronald Apriliyanto Halim, Mamadou D. Seck
2011 Proceedings of the 2011 Winter Simulation Conference (WSC)  
This deters the development of simulation-based optimization methods that have a proper balance between the desired features (i.e. generality, efficiency, high-dimensionality and transparency).  ...  The proposed framework is developed based on Zeigler's modeling and simulation framework and the phases of an optimization study in operations research.  ...  As for the future research, we plan to further develop SIMEON with different evolutionary-based algorithms and perform further testing with real-world and benchmark problems.  ... 
doi:10.1109/wsc.2011.6147987 dblp:conf/wsc/HalimS11 fatcat:mpcxxwzvbjcn7cvhr3dp6q433i

Multi-user frequency domain scheduling for WiMAX OFDMA

Alexander A. Maltsev, Andrey V. Pudeyev, Alexander A. Maltsev
2007 2007 16th IST Mobile and Wireless Communications Summit  
This paper introduces the performance analysis of 802.16e OFDMA system in UL mode with respect to multi-user scheduling algorithms in frequency domain.  ...  It is shown that multi-user scheduling in frequency domain potentially can greatly improve OFDMA system efficiency in frequency-selective broadband channel.  ...  It can be seen, that adaptive multi-user scheduling may benefit a lot from the knowledge of channel and interference profiles.  ... 
doi:10.1109/istmwc.2007.4299279 fatcat:ifh6q6d2mbd6xjf35umhm4ubrq
« Previous Showing results 1 — 15 out of 260,441 results