Results 51 to 60 of about 258,177 (241)

Model checking medium access control for sensor networks [PDF]

open access: yes, 2006
We describe verification of S-MAC, a medium access control protocol designed for wireless sensor networks, by means of the PRISM model checker. The S-MAC protocol is built on top of the IEEE 802.11 standard for wireless ad hoc networks and, as such, it ...
Ballarini, P., Miller, A.
core   +1 more source

An Effective and Practical Probabilistic Simplified Neutrosophic Approach for Accurate and Reliable Innovative Design Evaluation for Digital Media Arts [PDF]

open access: yesNeutrosophic Sets and Systems
The evaluation and classification of digital artworks remain a challenging task due to the inherent uncertainty, subjectivity, and imprecision in artistic design.
Yang Zhang, Yuzhuo Zhang
doaj   +1 more source

Probabilistic Preference Logic Networks

open access: yes, 2014
Reasoning about an entity's preferences (be it a user of an application, an individual targeted for marketing, or a group of people whose choices are of interest) has a long history in different areas of study. In this paper, we adopt the point of view that grows out of the intersection of databases and knowledge representation, where preferences are ...
Lukasiewicz T.   +2 more
openaire   +4 more sources

Statistical relational learning with soft quantifiers [PDF]

open access: yes, 2016
Quantification in statistical relational learning (SRL) is either existential or universal, however humans might be more inclined to express knowledge using soft quantifiers, such as ``most'' and ``a few''.
B Huang   +16 more
core   +2 more sources

A Cooperative Control Method for Fully Mechanized Mining Machines Based on Fuzzy Logic Theory and Neural Networks

open access: yesAdvances in Mechanical Engineering, 2015
In a fully mechanized mining face, the coordinated control of coal mining machines has a significant promoting effect to perfect the mining environment and improve the efficiency of coal production and has become a research focus all over the world.
Chao Tan   +4 more
doaj   +1 more source

Flow-based reputation with uncertainty: Evidence-Based Subjective Logic

open access: yes, 2015
The concept of reputation is widely used as a measure of trustworthiness based on ratings from members in a community. The adoption of reputation systems, however, relies on their ability to capture the actual trustworthiness of a target.
de Hoogh, Sebastiaan J. A.   +2 more
core   +1 more source

Formal analysis techniques for gossiping protocols [PDF]

open access: yes, 2007
We give a survey of formal verification techniques that can be used to corroborate existing experimental results for gossiping protocols in a rigorous manner.
Bakhshi, Rena   +3 more
core   +5 more sources

A Theoretical Foundation for Syntactico-Semantic Pattern Recognition

open access: yesIEEE Access, 2021
Conventionally syntactic pattern recognition tasks have been driven by grammars defining a syntactic structure. Syntactic Pattern recognition tasks were primarily relying on the ability of parsing algorithms to recognize the patterns in the input data ...
Shrinivasan Patnaikuni, Sachin Gengaje
doaj   +1 more source

On the Optimality of Trust Network Analysis with Subjective Logic

open access: yesAdvances in Electrical and Computer Engineering, 2014
Building and measuring trust is one of crucial aspects in e-commerce, social networking and computer security. Trust networks are widely used to formalize trust relationships and to conduct formal reasoning of trust values.
PARK, Y.
doaj   +1 more source

Fuzzy Clustering Algorithm for Enhancing Reliability and Network Lifetime of Wireless Sensor Networks

open access: yesIEEE Access, 2020
To prolong the function of wireless sensor networks (WSNs), the lifetime of the system has to be increased. WSNs lifetime can be calculated by using a few generic parameters, such as the time until the death of the first node and other parameters ...
Sonam Lata   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy