![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Novel Parallel Hardware Methodology for Solving Linear System of Equations
In this paper, we proposed a parallel hardware methodology employing the modified Gaussian elimination algorithm to efficiently solve linear system of equations (LSEs). Two parallel operators are issued in the...
-
Article
Multi-resolution motion estimation and compensation based on adjacent prediction of frame difference in wavelet domain
Aiming at the higher bit-rate occupation of motion vector encoding and more time load of full-searching strategies, a multi-resolution motion estimation and compensation algorithm based on adjacent prediction ...
-
Article
Efficient and configurable transmission protocol based on UDP in grid computing
At present, mainstream data transfer protocols are not always a good match for the diverse demands of grid computing. Considering this situation, this article proposes an efficient and configurable data transf...
-
Chapter and Conference Paper
Analysis of Local Route Maintenance for Ad Hoc Network
In ad hoc network, most link ailure recoveries can be localized to a small region along the previous route. However, the theory is not proved by mathematic analysis and simulations. In this paper, we analyze i...
-
Chapter and Conference Paper
Multi-robot Cooperation Based on Hierarchical Reinforcement Learning
Multi-agent reinforcement learning for multi-robot systems is a challenging issue in both robotics and artificial intelligence. But multi-agent reinforcement learning is bedeviled by the curse of dimensionalit...
-
Chapter and Conference Paper
Group-Based Key Management for Multicast of Ad Hoc Sensor Network
In order to protect communication security among sensor nodes, a cryptographic method are needed by ad hoc sensor networks. According to that most ad hoc sensor networks are deployed in groups, a group-based m...
-
Chapter and Conference Paper
An Algorithm for Improving Hilbert-Huang Transform
The Hilbert-Huang transform is viewed as a promising method to process the nonlinear and non-stationary signal. However, it hasn’t been a general method in signal processing due to its some deficiencies. In th...
-
Chapter and Conference Paper
Water Mine Model Recognition by Immune Neural Network
An immune neural network (INN) is proposed for water mine model recognition. The INN is a two-layer Boolean network whose number of outputs is adaptive according to the task and the affinity threshold. The pre...
-
Chapter and Conference Paper
A New Method for the Design of Stateless Transitive Signature Schemes
Transitive signature is a new and useful cryptology tool for information security, Internet security, and e-commercial security. Most of the current transitive signature schemes are stateful, which increases t...
-
Chapter and Conference Paper
An Adaptive Fault Tolerance Scheme for Applications on Real-Time Embedded System
An adaptive fault tolerance scheme aiming at those real-time embedded systems that have single processor and limited resources is presented in this paper. As the fault behavior exhibited by system changes with...
-
Chapter and Conference Paper
Pareto-Q Learning Algorithm for Cooperative Agents in General-Sum Games
Rationality and convergence are two important criterions for multi-agent learning. A novel method called Pareto-Q learning is prompted for cooperative general-sum games, with the Pareto Optimum allowing ration...
-
Chapter and Conference Paper
Fuzzy Neuro-BDI
The typical BDI (Belief-Desire-Intention) model of agent is not efficiently computable and the strict logic expression is not easily applicable to the domain with uncertainties. In this paper, a fuzzy neuro-BD...