Nothing Special   »   [go: up one dir, main page]

Kim et al., 2010 - Google Patents

Application of max-sum algorithm to radar coordination and scheduling

Kim et al., 2010

View PDF
Document ID
5128546282279754491
Author
Kim Y
Krainin M
Lesser V
Publication year
Publication venue
Workshop on Distributed Constraint Reasoning

External Links

Snippet

The Max-Sum algorithm is a constraint optimization algorithm using message passing that can be configured to work in an approximate mode. It has been shown that in this mode it compares well with other approximate distributed optimization approaches. We used the …
Continue reading at www.cs.huji.ac.il (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/50Network service management, i.e. ensuring proper service fulfillment according to an agreement or contract between two parties, e.g. between an IT-provider and a customer
    • H04L41/5041Service implementation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/56Packet switching systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/14Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computer systems utilising knowledge based models
    • G06N5/04Inference methods or devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic

Similar Documents

Publication Publication Date Title
Iftikhar et al. AI-based fog and edge computing: A systematic review, taxonomy and future directions
Li et al. FLEAM: A federated learning empowered architecture to mitigate DDoS in industrial IoT
Latah et al. Artificial intelligence enabled software‐defined networking: a comprehensive overview
Yu et al. A survey of multi-agent trust management systems
Grzonka et al. Using a multi-agent system and artificial intelligence for monitoring and improving the cloud performance and security
Liu et al. A distributed algorithm for task offloading in vehicular networks with hybrid fog/cloud computing
Rathee et al. Decision-making model for securing IoT devices in smart industries
Li et al. Data-driven and feedback-enhanced trust computing pattern for large-scale multi-cloud collaborative services
Avasalcai et al. Resource management for latency-sensitive IoT applications with satisfiability
Wang et al. Trust-based task assignment with multiobjective optimization in service-oriented ad hoc networks
Balusamy et al. Bio-inspired algorithms for cloud computing: a review
Zeng et al. Trust-based multi-agent imitation learning for green edge computing in smart cities
Cardellini et al. Self-adaptive container deployment in the fog: A survey
Agrawal Autonomic cloud computing based management and security solutions: State‐of‐the‐art, challenges, and opportunities
Agate et al. Vulnerability Evaluation of Distributed Reputation Management Systems.
Barika et al. Online scheduling technique to handle data velocity changes in stream workflows
Sedlak et al. Equilibrium in the Computing Continuum through Active Inference
Jain et al. Blockchain enabled trusted task offloading scheme for fog computing: A deep reinforcement learning approach
Kim et al. Application of max-sum algorithm to radar coordination and scheduling
Akhtarshenas et al. Federated Learning: A Cutting-Edge Survey of the Latest Advancements and Applications
Bao QoS-based trust computing scheme for SLA guarantee in cloud computing system
Kamel et al. Exploiting client-side collected measurements to perform QoS assessment of IaaS
Pakmehr et al. ETFC: Energy-efficient and deadline-aware task scheduling in fog computing
Wahab et al. Misbehavior detection framework for community-based cloud computing
Kamel Client-based QoS monitoring and evaluation architecture for network infrastructure and services