Kim et al., 2010 - Google Patents
Application of max-sum algorithm to radar coordination and schedulingKim et al., 2010
View PDF- Document ID
- 5128546282279754491
- Author
- Kim Y
- Krainin M
- Lesser V
- Publication year
- Publication venue
- Workshop on Distributed Constraint Reasoning
External Links
Snippet
The Max-Sum algorithm is a constraint optimization algorithm using message passing that can be configured to work in an approximate mode. It has been shown that in this mode it compares well with other approximate distributed optimization approaches. We used the …
- 238000005457 optimization 0 abstract description 45
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/50—Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
- H04L41/5041—Service implementation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/14—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Iftikhar et al. | AI-based fog and edge computing: A systematic review, taxonomy and future directions | |
Li et al. | FLEAM: A federated learning empowered architecture to mitigate DDoS in industrial IoT | |
Latah et al. | Artificial intelligence enabled software‐defined networking: a comprehensive overview | |
Yu et al. | A survey of multi-agent trust management systems | |
Grzonka et al. | Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security | |
Liu et al. | A distributed algorithm for task offloading in vehicular networks with hybrid fog/cloud computing | |
Rathee et al. | Decision-making model for securing IoT devices in smart industries | |
Li et al. | Data-driven and feedback-enhanced trust computing pattern for large-scale multi-cloud collaborative services | |
Avasalcai et al. | Resource management for latency-sensitive IoT applications with satisfiability | |
Wang et al. | Trust-based task assignment with multiobjective optimization in service-oriented ad hoc networks | |
Balusamy et al. | Bio-inspired algorithms for cloud computing: a review | |
Zeng et al. | Trust-based multi-agent imitation learning for green edge computing in smart cities | |
Cardellini et al. | Self-adaptive container deployment in the fog: A survey | |
Agrawal | Autonomic cloud computing based management and security solutions: State‐of‐the‐art, challenges, and opportunities | |
Agate et al. | Vulnerability Evaluation of Distributed Reputation Management Systems. | |
Barika et al. | Online scheduling technique to handle data velocity changes in stream workflows | |
Sedlak et al. | Equilibrium in the Computing Continuum through Active Inference | |
Jain et al. | Blockchain enabled trusted task offloading scheme for fog computing: A deep reinforcement learning approach | |
Kim et al. | Application of max-sum algorithm to radar coordination and scheduling | |
Akhtarshenas et al. | Federated Learning: A Cutting-Edge Survey of the Latest Advancements and Applications | |
Bao | QoS-based trust computing scheme for SLA guarantee in cloud computing system | |
Kamel et al. | Exploiting client-side collected measurements to perform QoS assessment of IaaS | |
Pakmehr et al. | ETFC: Energy-efficient and deadline-aware task scheduling in fog computing | |
Wahab et al. | Misbehavior detection framework for community-based cloud computing | |
Kamel | Client-based QoS monitoring and evaluation architecture for network infrastructure and services |