To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The Resource Description Framework (RDF) is a flexible model for representing information about resources on the Web. As a W3C (World Wide Web Consortium) Recommendation, RDF has rapidly gained popularity. With the widespread acceptance of RDF on the Web and in the enterprise, a huge amount of RDF data is being proliferated and becoming available. Efficient and scalable management of RDF data is therefore of increasing importance. RDF data management has attracted attention in the database and Semantic Web communities. Much work has been devoted to proposing different solutions to store RDF data efficiently. This paper focusses on using relational databases and NoSQL (for ‘not only SQL (Structured Query Language)’) databases to store massive RDF data. A full up-to-date overview of the current state of the art in RDF data storage is provided in the paper.
Pervasive systems are intended to make use of services and components that they encounter in their environment. Such systems are naturally spatial in that they can only be understood in terms of the ways in which components meet and interact in space. Rather than treating spatiality separately from system components, researchers are starting to develop computational models in which the entire structure of a pervasive system is modelled and constructed using an explicit spatial model, supporting multi-level spatial reasoning, and adapting autonomously to spatial interactions. In this paper, we review current and emerging models of spatial computing for pervasive ecosystems, and highlight some of the trends that will guide future research.
A graph G is H-saturated if it contains no copy of H as a subgraph but the addition of any new edge to G creates a copy of H. In this paper we are interested in the function satt(n,p), defined to be the minimum number of edges that a Kp-saturated graph on n vertices can have if it has minimum degree at least t. We prove that satt(n,p) = tn − O(1), where the limit is taken as n tends to infinity. This confirms a conjecture of Bollobás when p = 3. We also present constructions for graphs that give new upper bounds for satt(n,p).
We consider a network of interacting individuals, whose actions or transitions are determined by the states (behavior) of their neighbors as well as their own personal decisions. Specifically, we develop a model according to two simple decision-making rules that can describe the growth of the user population of a newly launched product or service. We analyze 22 sets of real-world historical growth data of a variety of products and services, and show that they all follow the growth equation. The numerical procedure for finding the model parameters allows the market size, and the relative effectiveness of customer service and promotional efforts to be estimated from the available historical growth data. We study the growth profiles of products and find that for a product or service to reach a mature stage within a reasonably short time in its user growth profile, the user growth rate corresponding to influenced transitions must exceed a certain threshold. Furthermore, results show that individuals in the group of celebrities having numerous friends become users of a new product or service at a much faster rate than those connected to ordinary individuals having fewer friends.
Let ℱ be a family of graphs and let d be large enough. For every d-regular graph G, we study the existence of a spanning ℱ-free subgraph of G with large minimum degree. This problem is well understood if ℱ does not contain bipartite graphs. Here we provide asymptotically tight results for many families of bipartite graphs such as cycles or complete bipartite graphs. To prove these results, we study a locally injective analogue of the question.
Let k ⩾ 3 be a fixed integer and let Zk(G) be the number of k-colourings of the graph G. For certain values of the average degree, the random variable Zk(G(n, m)) is known to be concentrated in the sense that $\tfrac{1}{n}(\ln Z_k(G(n,m))-\ln\Erw[Z_k(G(n,m))])$ converges to 0 in probability (Achlioptas and Coja-Oghlan, Proc. FOCS 2008). In the present paper we prove a significantly stronger concentration result. Namely, we show that for a wide range of average degrees, $\tfrac{1}{\omega}(\ln Z_k(G(n,m))-\ln\Erw[Z_k(G(n,m))])$ converges to 0 in probability for any diverging function $\omega=\omega(n)\ra\infty$. For k exceeding a certain constant k0 this result covers all average degrees up to the so-called condensation phase transitiondk,con, and this is best possible. As an application, we show that the experiment of choosing a k-colouring of the random graph G(n,m) uniformly at random is contiguous with respect to the so-called ‘planted model’.
Classical ergodic theory for integer-group actions uses entropy as a complete invariant for isomorphism of IID (independent, identically distributed) processes (a.k.a. product measures). This theory holds for amenable groups as well. Despite recent spectacular progress of Bowen, the situation for non-amenable groups, including free groups, is still largely mysterious. We present some illustrative results and open questions on free groups, which are particularly interesting in combinatorics, statistical physics and probability. Our results include bounds on minimum and maximum bisection for random cubic graphs that improve on all past bounds.
Given an undirected graph G, let us randomly orient G by tossing independent (possibly biased) coins, one for each edge of G. Writing a → b for the event that there exists a directed path from a vertex a to a vertex b in such a random orientation, we prove that for any three vertices s, a and b of G, we have ℙ(s → a ∩ s → b) ⩾ ℙ(s → a) ℙ(s → b).
We prove that certain natural sequent systems for bi-intuitionistic logic have the analytic cut property. In the process we show that the (global) subformula property implies the (local) analytic cut property, thereby demonstrating their equivalence. Applying a version of Maehara technique modified in several ways, we prove that bi-intuitionistic logic enjoys the classical Craig interpolation property and Maximova variable separation property; its Halldén completeness follows.
In previous works, by importing ideas from game semantics (notably Faggian–Maurel–Curien's ludics nets), we defined a new class of multiplicative/additive polarized proof nets, called J-proof nets. The distinctive feature of J-proof nets with respect to other proof net syntaxes, is the possibility of representing proof nets which are partially sequentialized, by using jumps (that is, untyped extra edges) as sequentiality constraints. Starting from this result, in the present work, we extend J-proof nets to the multiplicative/exponential fragment, in order to take into account structural rules: More precisely, we replace the familiar linear logic notion of exponential box with a less restricting one (called cone) defined by means of jumps. As a consequence, we get a syntax for polarized nets where, instead of a structure of boxes nested one into the other, we have one of cones which can be partially overlapping. Moreover, we define cut-elimination for exponential J-proof nets, proving, by a variant of Gandy's method, that even in case of ‘superposed’ cones, reduction enjoys confluence and strong normalization.
Several industrial systems are characterized by high nonlinearities with wide operating ranges and large set point changes. Identification and representation of these systems represent a challenge, especially for control engineers. Multimodel technique is one effective approach that can be used to describe nonlinear systems through the combination of several submodels, where each is contributing to the output with a certain degree of validity. One major concern in this technique, especially for systems with unknown operating conditions, is the partitioning of the system's operating space and thus the identification of different submodels. This paper proposes a three-stage approach to obtain a multimodel representation of a nonlinear system. A reinforced combinatorial particle swarm optimization and hybrid K-means are used to determine the number of submodels and their respective parameters. The proposed method automatically optimizes the number of submodels with respect to the submodel complexity. This allows operating space partition and generation of a parsimonious number of submodels without prior knowledge. The application of this approach on several examples, including a continuous stirred tank reactor, demonstrates its effectiveness.
Primary among all the activities involved in conceptual design is freehand sketching. There have been significant efforts in recent years to enable digital design methods that leverage humans’ sketching skills. Conventional sketch-based digital interfaces are built on two-dimensional touch-based devices like sketchers and drawing pads. The transition from two-dimensional to three-dimensional (3-D) digital sketch interfaces represents the latest trend in developing new interfaces that embody intuitiveness and human–human interaction characteristics. In this paper, we outline a novel screenless 3-D sketching system. The system uses a noncontact depth-sensing RGB-D camera for user input. Only depth information (no RGB information) is used in the framework. The system tracks the user's palm during the sketching process and converts the data into a 3-D sketch. As the generated data is noisy, making sense of what is sketched is facilitated through a beautification process that is suited to 3-D sketches. To evaluate the performance of the system and the beautification scheme, user studies were performed on multiple participants for both single-stroke and multistroke sketching scenarios.
A function-based keyword search is a concept generation methodology studied in the bioinspired design area that conveys textual biological inspiration for engineering design. Current keyword search methods are inefficient primarily due to the knowledge gap between engineering and biology domains. To improve current keyword search methods, we propose an algorithm that extracts and organizes morphology-based solutions from biological text. WordNet is utilized to discover morphological solutions in biological text. The novel algorithm also adapts latent semantic analysis and the expectation–maximization algorithm to categorize morphological solutions and group biological text. We introduce a novel penalty function that reflects the distance between functions (problems) and morphologies (solutions). The penalty function allows the algorithm to extract morphological solutions directly related to a design problem. We compare the output of the algorithm to manually extracted solutions for validation. A case study is included to exemplify the utility of the developed algorithm. Upon implementation of the algorithm, engineering designers can discover innovative solutions in biological text in a straightforward, efficient manner.
We describe a general construction of finiteness spaces which subsumes the interpretations of all positive connectors of linear logic. We then show how to apply this construction to prove the existence of least fixpoints for particular functors in the category of finiteness spaces: These include the functors involved in a relational interpretation of lazy recursive algebraic datatypes along the lines of the coherence semantics of system T.
Learn the fundamentals of architecture design, protocol optimization, and application development for wireless-powered communication networks with this authoritative guide. Readers will gain a detailed understanding of the issues surrounding architecture and protocol design, with key topics covered including relay-based energy harvesting systems, multiple-antenna systems for simultaneous wireless information and power transfer (SWIPT), performance modeling and analysis, and ambient wireless energy harvesting based cellular systems. Current applications of energy harvesting and transfer in different wireless networking scenarios are discussed, aiding the understanding of practical system development and implementation issues from an engineering perspective. The first book to provide a unified view of energy harvesting and wireless power transfer networks from a communications perspective, this is an essential text for researchers working on wireless communication networks and wireless systems, RF engineers, and wireless application developers.
In this chapter, we present an algebraic construction of a special type of LDPC code whose Tanner graph has a very specific structure. For an LDPC code of this type, its Tanner graph is locally connected. Every VN is only connected to the CNs that are confined to a (small) span of ρcol consecutive locations and every CN is only connected to VNs that are confined to a (small) span of ρrow consecutive locations. We call such constraints on the connections between VNs and CNs of a Tanner graph (ρcol,ρrow)-span-constraints. With this span-constraint, the Tanner graph of such an LDPC code is actually a chain of small Tanner graphs in which each graph is connected to its adjacent graphs on either side of it, except the first and the last ones. An LDPC code of this type is called a span-constrained LDPC code. The SC-LDPC code investigated in [59, 60, 22, 86] is a type of span-constrained LDPC code.
An SC-LDPC code is an LDPC convolutional (LDPC-C) code viewed from a graphical point of view (or a spatial coupling point of view) [49, 104, 66, 67, 92]. An LDPC-C code [49, 104] is specified by a bi-infinite parity-check matrix whose nonzero entries are confined to a diagonal band of a certain width ρrow and a certain depth ρcol. The nonzero entries in every row are confined to a span of ρrow consecutive locations and the nonzero entries in every column are confined to a span of ρcol consecutive locations. With these constraints on the locations of the nonzero entries of the parity-check matrix of an LDPC-C code, every VN in its Tanner graph is only connected to the CNs that are confined to a span of ρcol consecutive locations and every CN is only connected to VNs that are confined to a span of ρrow consecutive locations. These constraints on the locations of the nonzero entries of the parity-check matrix of an LDPC-C code lead to the graphical (ρcol,ρrow)-span-constraint as mentioned above. Hence, an LDPC-C code is a span-constrained LDPC code, an SC-LDPC code.