We consider the problem of network coding across three unicast sessions over a directed acyclic graph, where the sender and receiver of each unicast session are both connected to the network via a single edge of unit capacity. We consider a network model in which the middle of the network can only perform random linear […]
Read moreBayesian network classifier (BNCs) are typically implemented on nowadays desktop computers. However, many real world applications require classifier implementation on embedded or low power systems. Aspects for this purpose have not been studied rigorously. We partly close this gap by analyzing reduced precision implementations of BNCs. In detail, we investigate the quantization of the parameters […]
Read moreHierarchical Risk Assessment of Transmission System Considering the Influence of Active Distribution Network
In traditional distribution system, power flow was unidirectional; thus loads were usually aggregated into the substation as an equivalent constant bus in the original risk analysis of transmission system. Detail structures of the distribution system were absolutely ignored. However, distribution system is transformed from passive to active nowadays with more and more distributed generations (DGs) […]
Read moreGene Regulation Network Modeling via Improved Multi-agent System and Dynamic Bayesian Network
Gene regulation network is playing a more and more important role in system biology, bioinformatics and pharmacology in the era of post-genomic. This paper presents a high efficient and accurate method to model gene regulation network. In the method, we first use an improved Multi-Agent System (Im-MAS) to fuse multiple data sources to generate an […]
Read moreAs a newly emerging network model, heterogeneous information networks (HINs) have received growing attention. Many data mining tasks have been explored in HINs, including clustering, classification, and similarity search. Similarity join is a fundamental operation required for many problems. It is attracting attention from various applications on network data, such as friend recommendation, link prediction, […]
Read moreRecently, the way people consume video content has been undergoing a dramatic change. Plain TV sets, that have been the center of home entertainment for a long time, are losing grounds to Hybrid TV’s, PC’s, game consoles, and, more recently, mobile devices such as tablets and smartphones. The new predominant paradigm is: watch what I […]
Read moreWe consider wireless sensor networks (WSNs) used for distributed estimation of unknown parameters. Due to the limited bandwidth, sensor nodes quantize their noisy observations before transmission to a fusion center (FC) for the estimation process. In this letter, the correlation between observations is exploited to reduce the mean-square error (MSE) of the distributed estimation. Specifically, […]
Read moreWe propose a framework to bridge the gap between secure authentication in automotive networks and on the internet. Our proposed framework allows runtime key exchanges with minimal overhead for resource-constrained in-vehicle networks. It combines symmetric and asymmetric cryptography to establish secure communication and enable secure updates of keys and software throughout the lifetime of the […]
Read moreTo increase the energy efficiency of Ethernet networks, in 2010, the IEEE published the IEEE 802.3az amendment, known as Energy Efficient Ethernet (EEE). The amendment introduces a new operational mode, defined as Low Power Idle (LPI), that allows to considerably reduce the power consumption of inactive Ethernet links. In this paper, we address the application […]
Read moreFor efficient and reliable data transmission, the traffic load should be as uniformly distributed as possible in the network, and the average distance traveled by the data should be short. This criterion has been shown to be fundamental. The key design problem is therefore to find the optimal solution that achieves this criterion. With a […]
Read more