129 resultados para auction aggregation protocols

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Fuzzy logic provides a mathematical formalism for a unified treatment of vagueness and imprecision that are ever present in decision support and expert systems in many areas. The choice of aggregation operators is crucial to the behavior of the system that is intended to mimic human decision making. This paper discusses how aggregation operators can be selected and adjusted to fit empirical data—a series of test cases. Both parametric and nonparametric regression are considered and compared. A practical application of the proposed methods to electronic implementation of clinical guidelines is presented

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The need for monotone approximation of scattered data often arises in many problems of regression, when the monotonicity is semantically important. One such domain is fuzzy set theory, where membership functions and aggregation operators are order preserving. Least squares polynomial splines provide great flexbility when modeling non-linear functions, but may fail to be monotone. Linear restrictions on spline coefficients provide necessary and sufficient conditions for spline monotonicity. The basis for splines is selected in such a way that these restrictions take an especially simple form. The resulting non-negative least squares problem can be solved by a variety of standard proven techniques. Additional interpolation requirements can also be imposed in the same framework. The method is applied to fuzzy systems, where membership functions and aggregation operators are constructed from empirical data.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article discusses a range of regression techniques specifically tailored to building aggregation operators from empirical data. These techniques identify optimal parameters of aggregation operators from various classes (triangular norms, uninorms, copulas, ordered weighted aggregation (OWA), generalized means, and compensatory and general aggregation operators), while allowing one to preserve specific properties such as commutativity or associativity. © 2003 Wiley Periodicals, Inc.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper treats the problem of fitting general aggregation operators with unfixed number of arguments to empirical data. We discuss methods applicable to associative operators (t-norms, t-conorms, uninorms and nullnorms), means and Choquet integral based operators with respect to a universal fuzzy measure. Special attention is paid to k-order additive symmetric fuzzy measures.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing the frequency and confidence of inconsistent secure messages. It provides a novel and efficient way to analyze security protocols and find out potential correlations between secure messages. The conducted experiments demonstrate our approaches.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Agent technology provides a new way to model many complex problems like financial investment planning. With this observation in mind, a financial investment planning system was developed from agent perspectives with 12 different agents integrated. Some of the agents have similar problem solving and decision making capabilities. The results from these agents require to be combined. Ordered Weighted Averaging (OWA) operator was chosen to aggregate different results. Details on how OWA was applied as well as appropriate evaluation are presented.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Security protocols have been widely used to safeguard secure electronic transactions. We usually assume that principals are credible and shall not maliciously disclose their individual secrets to someone else. Nevertheless, it is impractical to completely ignore the possibility that some principals may collude in private to achieve a fraudulent or illegal purpose. Therefore, it is critical to address the possibility of collusion attacks in order to correctly analyse security protocols. This paper proposes a framework by which to detect collusion attacks in security protocols. The possibility of security threats from insiders is especially taken into account. The case study demonstrates that our methods are useful and promising in discovering and preventing collusion attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Most of the current web-based application systems suffer from poor performance and costly heterogeneous accessing. Distributed or replicated strategies can alleviate the problem in some degree, but there are still some problems of the distributed or replicated model, such as data synchronization, load balance, and so on.  In this paper, we propose a novel architecture for Internet-based data processing system based on multicast and anycast protocols. The proposed architecture breaks the functionalities of existing data processing system, in particular, the database functionality, into several agents. These agents communicate with each other using multicast and anycast mechanisms. We show that the proposed architecture provides better scalability, robustness, automatic load balance, and performance than the current distributed architecture of Internet-based data
processing.