• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 448
  • 140
  • 77
  • 46
  • 35
  • 11
  • 9
  • 8
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 927
  • 365
  • 178
  • 159
  • 135
  • 128
  • 105
  • 104
  • 89
  • 87
  • 81
  • 76
  • 73
  • 70
  • 68
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Network Decontamination with Temporal Immunity

Yassine, Daadaa 25 January 2012 (has links)
Network decontamination is a well known mobile agent problem with many applications. We assume that all nodes of a network are contaminated (e.g., by a virus) and a set of agents is deployed to decontaminate them. An agent passing by a node decontaminates it, however a decontaminated node can be recontaminated if any of its neighbours is contaminated. In the vast literature a variety of models are considered and different assumptions are made on the power of the agents. In this thesis we study variation of the decontamination problem in mesh and tori topologies, under the assumption that when a node is decontaminated, it is immune to recontamination for a predefined amount of time t (called immunity time). After the immunity time is elapsed, recontamination can occur. We focus on three different models: mobile agents (MA), cellular automata (CA), and mobile cellular automata (MCA). The first two models are commonly studied and employed in several other contexts, the third model is introduced in this thesis for the first time. In each model we study the temporal decontamination problem (adapted to the particular setting) under a variety of assumptions on the capabilities of the decontaminating elements (agents for MA and MCA, decontaminating cells for CA). Some of the parameters we consider in this study are: visibility of the active elements, their ability to make copies of themselves, their ability to communicate, and the possibility to remember their past actions (memory). We describe several solutions in the various scenarios and we analyze their complexity. Efficiency is evaluated slightly differently in each model, but essentially the effort is in the minimization of the number of simultaneous decontaminating elements active in the system while performing the decontamination with a given immunity time.
42

Network Decontamination with Temporal Immunity

Yassine, Daadaa 25 January 2012 (has links)
Network decontamination is a well known mobile agent problem with many applications. We assume that all nodes of a network are contaminated (e.g., by a virus) and a set of agents is deployed to decontaminate them. An agent passing by a node decontaminates it, however a decontaminated node can be recontaminated if any of its neighbours is contaminated. In the vast literature a variety of models are considered and different assumptions are made on the power of the agents. In this thesis we study variation of the decontamination problem in mesh and tori topologies, under the assumption that when a node is decontaminated, it is immune to recontamination for a predefined amount of time t (called immunity time). After the immunity time is elapsed, recontamination can occur. We focus on three different models: mobile agents (MA), cellular automata (CA), and mobile cellular automata (MCA). The first two models are commonly studied and employed in several other contexts, the third model is introduced in this thesis for the first time. In each model we study the temporal decontamination problem (adapted to the particular setting) under a variety of assumptions on the capabilities of the decontaminating elements (agents for MA and MCA, decontaminating cells for CA). Some of the parameters we consider in this study are: visibility of the active elements, their ability to make copies of themselves, their ability to communicate, and the possibility to remember their past actions (memory). We describe several solutions in the various scenarios and we analyze their complexity. Efficiency is evaluated slightly differently in each model, but essentially the effort is in the minimization of the number of simultaneous decontaminating elements active in the system while performing the decontamination with a given immunity time.
43

Network Decontamination with Temporal Immunity

Yassine, Daadaa 25 January 2012 (has links)
Network decontamination is a well known mobile agent problem with many applications. We assume that all nodes of a network are contaminated (e.g., by a virus) and a set of agents is deployed to decontaminate them. An agent passing by a node decontaminates it, however a decontaminated node can be recontaminated if any of its neighbours is contaminated. In the vast literature a variety of models are considered and different assumptions are made on the power of the agents. In this thesis we study variation of the decontamination problem in mesh and tori topologies, under the assumption that when a node is decontaminated, it is immune to recontamination for a predefined amount of time t (called immunity time). After the immunity time is elapsed, recontamination can occur. We focus on three different models: mobile agents (MA), cellular automata (CA), and mobile cellular automata (MCA). The first two models are commonly studied and employed in several other contexts, the third model is introduced in this thesis for the first time. In each model we study the temporal decontamination problem (adapted to the particular setting) under a variety of assumptions on the capabilities of the decontaminating elements (agents for MA and MCA, decontaminating cells for CA). Some of the parameters we consider in this study are: visibility of the active elements, their ability to make copies of themselves, their ability to communicate, and the possibility to remember their past actions (memory). We describe several solutions in the various scenarios and we analyze their complexity. Efficiency is evaluated slightly differently in each model, but essentially the effort is in the minimization of the number of simultaneous decontaminating elements active in the system while performing the decontamination with a given immunity time.
44

Network Decontamination with Temporal Immunity

Yassine, Daadaa January 2012 (has links)
Network decontamination is a well known mobile agent problem with many applications. We assume that all nodes of a network are contaminated (e.g., by a virus) and a set of agents is deployed to decontaminate them. An agent passing by a node decontaminates it, however a decontaminated node can be recontaminated if any of its neighbours is contaminated. In the vast literature a variety of models are considered and different assumptions are made on the power of the agents. In this thesis we study variation of the decontamination problem in mesh and tori topologies, under the assumption that when a node is decontaminated, it is immune to recontamination for a predefined amount of time t (called immunity time). After the immunity time is elapsed, recontamination can occur. We focus on three different models: mobile agents (MA), cellular automata (CA), and mobile cellular automata (MCA). The first two models are commonly studied and employed in several other contexts, the third model is introduced in this thesis for the first time. In each model we study the temporal decontamination problem (adapted to the particular setting) under a variety of assumptions on the capabilities of the decontaminating elements (agents for MA and MCA, decontaminating cells for CA). Some of the parameters we consider in this study are: visibility of the active elements, their ability to make copies of themselves, their ability to communicate, and the possibility to remember their past actions (memory). We describe several solutions in the various scenarios and we analyze their complexity. Efficiency is evaluated slightly differently in each model, but essentially the effort is in the minimization of the number of simultaneous decontaminating elements active in the system while performing the decontamination with a given immunity time.
45

Weighted Finite Automata over Strong Bimonoids

Droste, Manfred, Stüber, Torsten, Vogler, Heiko 13 December 2018 (has links)
We investigate weighted finite automata over strings and strong bimonoids. Such algebraic structures satisfy the same laws as semirings except that no distributivity laws need to hold. We define two different behaviors and prove precise characterizations for them if the underlying strong bimonoid satisfies local finiteness conditions. Moreover, we show that in this case the given weighted automata can be determinized.
46

Learning algorithms for the control of routing in integrated service communication networks

Reeve, Jonathan Mark January 1998 (has links)
There is a high degree of uncertainty regarding the nature of traffic on future integrated service networks. This uncertainty motivates the use of adaptive resource allocation policies that can take advantage of the statistical fluctuations in the traffic demands. The adaptive control mechanisms must be 'lightweight', in terms of their overheads, and scale to potentially large networks with many traffic flows. Adaptive routing is one form of adaptive resource allocation, and this thesis considers the application of Stochastic Learning Automata (SLA) for distributed, lightweight adaptive routing in future integrated service communication networks. The thesis begins with a broad critical review of the use of Artificial Intelligence (AI) techniques applied to the control of communication networks. Detailed simulation models of integrated service networks are then constructed, and learning automata based routing is compared with traditional techniques on large scale networks. Learning automata are examined for the 'Quality-of-Service' (QoS) routing problem in realistic network topologies, where flows may be routed in the network subject to multiple QoS metrics, such as bandwidth and delay. It is found that learning automata based routing gives considerable blocking probability improvements over shortest path routing, despite only using local connectivity information and a simple probabilistic updating strategy. Furthermore, automata are considered for routing in more complex environments spanning issues such as multi-rate traffic, trunk reservation, routing over multiple domains, routing in high bandwidth-delay product networks and the use of learning automata as a background learning process. Automata are also examined for routing of both 'real-time' and 'non-real-time' traffics in an integrated traffic environment, where the non-real-time traffic has access to the bandwidth 'left over' by the real-time traffic. It is found that adopting learning automata for the routing of the real-time traffic may improve the performance to both real and non-real-time traffics under certain conditions. In addition, it is found that one set of learning automata may route both traffic types satisfactorily. Automata are considered for the routing of multicast connections in receiver-oriented, dynamic environments, where receivers may join and leave the multicast sessions dynamically. Automata are shown to be able to minimise the average delay or the total cost of the resulting trees using the appropriate feedback from the environment. Automata provide a distributed solution to the dynamic multicast problem, requiring purely local connectivity information and a simple updating strategy. Finally, automata are considered for the routing of multicast connections that require QoS guarantees, again in receiver-oriented dynamic environments. It is found that the distributed application of learning automata leads to considerably lower blocking probabilities than a shortest path tree approach, due to a combination of load balancing and minimum cost behaviour.
47

Cellular Automaton Based Algorithms for Wireless Sensor Networks

Choudhury, Salimur 26 November 2012 (has links)
Wireless sensor networks have been used in different applications due to the advancement of sensor technology. These uses also have raised different optimization issues. Most of the algorithms proposed as solutions to the various optimization problems are either centralized or distributed which are not ideal for these real life applications. Very few strictly local algorithms for wireless sensor networks exist in the literature. In this thesis, we consider some of these optimization problems of sensor networks, for example, sleep-wake scheduling, mobile dispersion, mobile object monitoring, and gathering problems. We also consider the depth adjustment problem of underwater sensor networks. We design cellular automaton based local algorithms for these problems. The cellular automaton is a bioinspired model used to model different physical systems including wireless sensor networks. One of the main advantages of using cellular automaton based algorithms is that they need very little local information to compute a solution. We perform different simulations and analysis and find that our algorithms are efficient in practice. / Thesis (Ph.D, Computing) -- Queen's University, 2012-11-25 13:37:36.854
48

Synthesis and characterisation of molecular materials

Davies, Hazel M. January 2008 (has links)
Chapter 1 contains a brief background into subjects such as Robin-Day classes, binary code, logic gates and electrochemistry in order to aid understanding of the rest of the chapter. The unique paradigm of Molecular Quantum Cellular Automata (MQCA) is presented along with the advantages it offers to traditional silicon based electronics. A summary of the existing modelled and synthesised MQCA systems is included along with an explanation of the characteristics required for materials to be suitable for MQCA. The subject of chapter 2 is cyclopentadiene cobalt cyclobutadiene complexes for the application of MQCA. The introduction examines the mechanism for the formation of cyclopentadiene cobalt cyclobutadiene complexes and the bonding in these compounds. A range of acetylenes were prepared for the formation of cyclopentadiene cobalt cyclobutadiene complexes were examined and characterised. Metal fragments including {Ru(dppe)2Cl} and AuPPh3Cl were attached to a cyclopentadiene cobalt cyclobutadiene core and these materials were characterised. The subject of chapter 3 is benzene based materials for the application of MQCA. 1,2,4,5-tetrakis(ferrocenylethynyl)benzene was prepared, characterised and the electrochemistry was examined for electronic communication between the ferrocene sites. A range of two metal centre compounds were examined for solubility and electrochemical stability with the view of preparing four metal centre compounds with a benzene core. The subject of chapter 4 is porphyrin based materials. This was the first area of work for this thesis and was discontinued. A brief summary of the synthetic work carried out is described, along with some literature work that was published whilst this work was being carried. Chapter 5 contains the experimental information for chapters 2-4.
49

Use of cellular automata models to examine complexity of organizational behaviour

Thompson, Michael J., University of Western Sydney January 2005 (has links)
The relatively new science of complex emergent processes is being applied to many fields including the study of organizations. There are many different models of the organization in current use, each with its own benefits. However, the science of complex emergent processes is able to deal with situations that conventional models have not been able to adequately describe. Wolfram's A New Kind of Science describes a comprehensive conceptual framework and scientific methodology which enables the study of organizations from a new perspective. These techniques create new ways of thinking about organizations and provide new insights into organizational behaviour. A particular class of complex emergent models are the cellular automata (CA). This thesis makes use of very basic cellular automata models described in Wolfram's A New Kind of Science to examine organizational behaviour. These models produce a variety of interesting patterns which can be easily interpreted and which graphically describe various characteristics of organizational behaviour. A variety of common types of organizational behaviour are examined and the organizational cultures which bring these behaviours about are investigated. The usefulness of using this method is considered. These techniques are then used to examine the reconstructing of Iraq in the period from the US led Coalition invasion in 2003 through to mid 2004. Several types of organizational behaviour are examined and the models are then used to examine various potential scenarios concerning the Iraq reconstruction process. The modelling outcomes about the Iraq reconstruction process are found to be comparable with the opinions of subject matter experts. Although limited in scope and only making use of a very limited class of models from all of those available in Wolfram's A New Kind of Science, this thesis demonstrated the usefulness of using such an approach in the understanding of organizational behaviour. The techniques used in this thesis, were able to demonstrate: the complex emergent properties of organizations; how organizational behaviour can be viewed as resulting from the interaction of individuals; the 'phase transitions' between different major classes of organizational behaviour; how different types of organizational behaviour are robust or otherwise to change; and how organizational behaviour forms naturally into certain common types. / Master of Science (Hons)
50

Probabilistic modelling of some problems in computer science /

Leung, Ming-ying. January 1983 (has links)
Thesis (M. Phil.)--University of Hong Kong, 1983.

Page generated in 0.4703 seconds