We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 10,000 results
  1. Surrogate Constraints for Synchronized Energy Production/Consumption

    We deal here with job scheduling under encapsulated renewable and non-renewable resource constraints, while relying on a case study related to energy...
    Fatiha Bendali, Alejandro Olivas Gonzales, ... Helene Toussaint in Combinatorial Optimization
    Conference paper 2024
  2. Neuron Pairs in Binarized Neural Networks Robustness Verification via Integer Linear Programming

    In the context of classification, robustness verification of a neural network is the problem which consists in determining if small changes of inputs...
    Dymitr Lubczyk, José Neto in Combinatorial Optimization
    Conference paper 2024
  3. Optimal Charging Station Location in a Linear Cycle Path with Deviations

    Bicycle tourism is on the rise thanks to assisted-pedaling bikes, also known as e-bikes. While pedalling is still required on these bikes, they allow...
    Luca Pirolo, Pietro Belotti, ... Paolo Pileri in Combinatorial Optimization
    Conference paper 2024
  4. On a Geometric Graph-Covering Problem Related to Optimal Safety-Landing-Site Location

    We develop a set-cover based integer-programming approach to an optimal safety-landing-site location arising in the design of urban...
    Claudia D’Ambrosio, Marcia Fampa, ... Felipe Sinnecker in Combinatorial Optimization
    Conference paper 2024
  5. Modular State Spaces - A New Perspective

    A modular Petri net is built from individual Petri nets, the instances, which have disjoint sets of internal transitions and interface transitions....
    Julian Gaede, Sophie Wallner, Karsten Wolf in Application and Theory of Petri Nets and Concurrency
    Conference paper 2024
  6. Relational Structures for Interval Order Semantics of Concurrent Systems

    Relational structures like partial orders that are based on acyclic relations capturing a ‘before’ relationship, can provide versatile frameworks for...
    Ryszard Janicki, Jetty Kleijn, ... Łukasz Mikulski in Application and Theory of Petri Nets and Concurrency
    Conference paper 2024
  7. Concurrent Context-Free Grammar for Parsing Business Processes with Iterated Shuffles

    Trace parsing, a technique for obtaining the correspondence between a trace, which is a string of activities, and a process model, forms the basis of...
    Akio Watanabe, Ayumi Araragi, ... Yousuke Takahashi in Application and Theory of Petri Nets and Concurrency
    Conference paper 2024
  8. Verifying Temporal Logic Properties in the Modular State Space

    A modular Petri net is composed of multiple individual Petri nets, the modules, by fusing their interface transitions. Internal transitions are not...
    Conference paper 2024
  9. On the Expressive Power of Transfinite Sequences for Continuous Petri Nets

    Continuous Petri nets (CPNs) form a model of (uncountably infinite) dynamic systems that has been successfully explored for modelling and theoretical...
    Conference paper 2024
  10. Using Petri Nets for Digital Twins Modeling and Deployment: A Power Wheelchair System Case Study

    Ideally, safety-critical systems should be designed to avoid or be resilient in handling failures that may occur during their lifetime. For...
    Carolina Lagartinho-Oliveira, Filipe Moutinho, Luís Gomes in Application and Theory of Petri Nets and Concurrency
    Conference paper 2024
  11. On the Application of Model-Driven Optimization to Business Processes

    The optimization of business processes is an important task to increase the efficiency of the described workflows. Metaheuristic optimization, such...
    Gabriele Taentzer, Jens Kosiol, Leen Lambers in Application and Theory of Petri Nets and Concurrency
    Conference paper 2024
  12. Identifying Duplicates in Large Collections of Petri Nets and Nested-Unit Petri Nets

    We propose efficient techniques for detecting isomorphism between nets, i.e., for identifying, in large collections of (safe) Petri nets or...
    Pierre Bouvier, Hubert Garavel in Application and Theory of Petri Nets and Concurrency
    Conference paper 2024
  13. Sequential Value Passing Yields a Kleene Theorem for Processes

    Communication with value passing has received ample attention in process theory. Value passing through a sequential composition has received much...
    Jos C. M. Baeten, Bas Luttik in Logics and Type Systems in Theory and Practice
    Chapter 2024
  14. A Bigraphs Paper of Sorts

    Bigraphs are an expressive graphical modelling formalism to represent systems with a mix of both spatial and non-local connectivity. Currently it is...
    Blair Archibald, Michele Sevegnani in Graph Transformation
    Conference paper 2024
  15. Nanoscale Communication Redefined: Exploring Bio-Inspired Molecular Systems

    This paper explores a novel communication model employing a channel with multiple interconnected nodes between the sender and recipient nanomachines....
    Conference paper 2024
  16. YOLOv8-AS: Masked Face Detection and Tracking Based on YOLOv8 with Attention Mechanism Model

    The development of intelligent surveillance systems relies significantly on the effectiveness of face detection. To identify suspicious individuals,...
    Shahad Fadhil Abbas, Shaimaa Hameed Shaker, Firas. A. Abdullatif in New Trends in Information and Communications Technology Applications
    Conference paper 2024
  17. IOT-Based Water Quality Monitoring for the Tigris River: Addressing Pollution Challenges

    The Tigris River is a second-largest river in southwestern Asia, flowing through Turkey, Syria, Iraq, and Iran. The river is facing lack of water...
    Mariam Abdul Jabbar Ali, Mahdi Nsaif Jasim, Saad Najm Al-Saad in New Trends in Information and Communications Technology Applications
    Conference paper 2024
  18. Crimes Tweet Detection Based on CNN Hyperparameter Optimization Using Snake Optimizer

    The increased use of social media has transformed how people share information. In the voluminous social media content, tweets involving criminal...
    Zainab Khyioon Abdalrdha, Abbas Mohsin Al-Bakry, Alaa K. Farhan in New Trends in Information and Communications Technology Applications
    Conference paper 2024
  19. A New Approach to Design KM1 Encryption Algorithm for Alarm in IoT

    The research introduces a hybrid encryption system for parallel computing environments, focusing on safeguarding IoT image data for fire incident...
    Conference paper 2024
  20. A Robust Image Cipher System Based on Cramer-Shoup Algorithm and 5-D Hyper Chaotic System

    The presented study suggests a novel image encryption method depending on a modified Cramer-Shoup encryption algorithm and a 5D hyper chaotic system....
    Zainab Khalid Ibrahim, Ekhlas Abbas Albahrani in New Trends in Information and Communications Technology Applications
    Conference paper 2024
Did you find what you were looking for? Share feedback.