Search
Search Results
-
Generalized Weighted Type Graphs for Termination of Graph Transformation Systems
We refine the weighted type graph technique for proving termination of double pushout (DPO) graph transformation systems. We increase the power of... -
Vehicular Indoor Localization and Tracking System
In this chapter, we implement a system prototype for vehicle localization and tracking in an indoor environment. First, we leverage ubiquitous... -
See Through System
With the continuous advancements in sensing technologies and wireless communication, video applications have gained significant popularity in IoV.... -
Non-line-of-sight Collision Warning System
VEC has been envisioned as a promising paradigm for enabling a variety of emerging ITSs. However, due to inevitable yet non-negligible issues in... -
Dynamic Workload Scheduling in Edge Computing
Edge computing has fixed and limited resource capacity, thus low resource scalability is one of the inherent shortages. Nevertheless, on the one... -
Canonization of a Random Circulant Graph by Counting Walks
It is well known that almost all graphs are canonizable by a simple combinatorial routine known as color refinement. With high probability, this... -
Black Hole Search in Dynamic Cactus Graph
We study the problem of black hole search by a set of mobile agents, where the underlying graph is a dynamic cactus. A black hole is a dangerous... -
On the Complexity of List \(\mathcal H\) -Packing for Sparse Graph Classes
The problem of packing as many subgraphs isomorphic to \(H \in \mathcal H\)... -
Plane Multigraphs with One-Bend and Circular-Arc Edges of a Fixed Angle
For an angle \(\alpha \in (0,\pi )\) , we consider plane graphs and... -
Efficient Enumeration of Drawings and Combinatorial Structures for Maximal Planar Graphs
We propose efficient algorithms for enumerating the celebrated combinatorial structures of maximal planar graphs, called canonical orderings and... -
Deep Reinforcement Learning Based Load Balancing for Heterogeneous Traffic in Datacenter Networks
Modern high-speed datacenter networks (DCNs) employ multi-tree topologies to provide large bisection bandwidth. Load balancing is crucial for making... -
LAST: An Efficient In-place Static Binary Translator for RISC Architectures
The lack of software has been a persistent issue for emerging instruction set architecture (ISA). To overcome this challenge, binary translation has... -
Approximate Query Processing Based on Approximate Materialized View
In the context of big data, the interactive analysis database system needs to answer aggregate queries within a reasonable response time. The... -
A Multi-objective Method for Energy-Efficient UAV Data Collection Communications
Unmanned aerial vehicles (UAVs) have been widely used to assist wireless sensor communications (WSN). However, due to the limited battery capacity of... -
A Task Offloading and Resource Allocation Optimization Method in End-Edge-Cloud Orchestrated Computing
The limited resources of mobile devices (MDs) pose an emerging requirement, resulting in its essential to reducing task processing latency and energy... -
Joint Video Transcoding and Representation Selection for Edge-Assisted Multi-party Video Conferencing
Current cloud-based multi-party video conferencing suffers from heavy workloads on media servers caused by video transcoding. Emerging edge computing... -
Test-and-Decode: A Partial Recovery Scheme for Verifiable Coded Computing
Coded computing has proven its efficiency in tolerating stragglers in distributed computing. Workers return the sub-computation results to the master... -
Attention Enhanced Package Pick-Up Time Prediction via Heterogeneous Behavior Modeling
The logistics industry has developed rapidly with the popularity of online-to-offline businesses in recent years. First-mile package pick-up is one... -
Key-Based Transaction Reordering: An Optimized Approach for Concurrency Control in Hyperledger Fabric
As blockchain technology garners increased adoption, permissioned blockchains like Hyperledger Fabric emerge as a popular blockchain system for... -
AIFR: Face Recognition Research Based on Age Factor Characteristics
As we all know, the facial appearance change caused by age change leads to the low accuracy of face recognition, which is a significant difficulty in...