Computer Science

All posts under tag "Computer Science"

266 posts total
Sorted by date
No Image

A radial version of the Central Limit Theorem

์ด ๋…ผ๋ฌธ์˜ ํ•ต์‹ฌ ์•„์ด๋””์–ด๋Š” ์›๋ž˜์˜ ์ค‘์‹ฌ๊ทนํ•œ์ •๋ฆฌ(Central Limit Theorem, CLT)๋ฅผ ๋ฐฉ์‚ฌํ˜• ๋ฒ„์ „์œผ๋กœ ํ™•์žฅํ•˜๋Š” ๊ฒƒ์ž…๋‹ˆ๋‹ค. ์ด ํ™•์žฅ์„ ํ†ตํ•ด ๋น„๋“ฑ๋ฐฉ์„ฑ ๊ฐ€์šฐ์Šค ํ•จ์ˆ˜๋ฅผ ๊ทผ์‚ฌํ•  ์ˆ˜ ์žˆ๋Š” ์ƒˆ๋กœ์šด ๋ฐฉ๋ฒ•๋ก ์„ ์ œ์‹œํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. 1. ๋ฐฉ์‚ฌํ˜• CLT์™€ ๋น„๋“ฑ๋ฐฉ์„ฑ ๊ฐ€์šฐ์Šค ํ•จ์ˆ˜์˜ ๊ทผ์‚ฌ ๋…ผ๋ฌธ์€ ๊ฐ ๋ฐฉ์‚ฌ ๋ฐฉํ–ฅ์— ๋”ฐ๋ผ ๋ฐ•์Šค ํ•จ์ˆ˜ ํญ์„ ์กฐ์ ˆํ•จ์œผ๋กœ์จ ๋น„๋“ฑ๋ฐฉ์„ฑ ๊ฐ€์šฐ์Šค ํ•จ์ˆ˜๋ฅผ ๊ทผ์‚ฌํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ์•„์ด๋””์–ด๋ฅผ ์ œ์‹œํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ํŠนํžˆ 4๋ฐฉํ–ฅ ๋ฐ•์Šค ์Šคํ”Œ๋ผ์ธ์ด๋ผ๋Š” ํŠน๋ณ„ํ•œ ๊ฒฝ์šฐ์—์„œ ํšจ๊ณผ์ ์ž…๋‹ˆ๋‹ค. ๊ณต๋ถ„์‚ฐ์„ ์ œ์–ดํ•˜๊ธฐ ์œ„ํ•ด ๋‹จ์ˆœํžˆ ๋ฐ•์Šค ๋ถ„ํฌ ํญ์„ ์กฐ์ ˆํ•˜๋Š” ๊ฐ„๋‹จํ•œ ์•Œ๊ณ ๋ฆฌ์ฆ˜์ด

Information Theory Mathematics Computer Science Computer Vision
Total coloring of pseudo-outerplanar graphs

Total coloring of pseudo-outerplanar graphs

: 1. ์ด ์ƒ‰์น  ๋ฌธ์ œ์™€ ๊ทธ ์ค‘์š”์„ฑ ์ด ์ƒ‰์น  ๋ฌธ์ œ๋Š” ๊ทธ๋ž˜ํ”„ ์ด๋ก ์—์„œ ์ค‘์š”ํ•œ ์œ„์น˜๋ฅผ ์ฐจ์ง€ํ•˜๋ฉฐ, ๊ฐ ์ •์ ๊ณผ ๊ฐ„์„ ์— ๊ณ ์œ ํ•œ ์ƒ‰์ƒ์„ ํ• ๋‹นํ•˜๋Š” ๋ฐฉ์‹์œผ๋กœ ๊ทธ๋ž˜ํ”„์˜ ๊ตฌ์กฐ์  ํŠน์„ฑ์„ ์ดํ•ดํ•˜๊ณ  ๋ถ„์„ํ•ฉ๋‹ˆ๋‹ค. ํŠนํžˆ, ์ด ์ƒ‰์น  ์ถ”์ธก์€ ๊ทธ๋ž˜ํ”„์˜ ์ตœ๋Œ€ ์ฐจ์ˆ˜ ฮ”(G)์™€ ๊ด€๋ จ๋œ ์ค‘์š”ํ•œ ๋ฌธ์ œ๋กœ, ์ด ์ถ”์ธก์ด ์ฆ๋ช…๋˜๋ฉด ๋งŽ์€ ๊ทธ๋ž˜ํ”„ ํด๋ž˜์Šค์— ๋Œ€ํ•œ ์ด ์ƒ‰์ƒ ์ˆ˜๋ฅผ ๊ฒฐ์ •ํ•˜๋Š” ๋ฐ ๋„์›€์ด ๋ฉ๋‹ˆ๋‹ค. 2. ์œ„์ƒ์  ์™ธํŒ ๊ทธ๋ž˜ํ”„์˜ ์ •์˜ ๋ฐ ํŠน์„ฑ ์œ„์ƒ์  ์™ธํŒ ๊ทธ๋ž˜ํ”„๋Š” ๊ฐ ๋ธ”๋ก์ด ๊ณ ์ •๋œ ์› ์œ„์—์„œ ์ •์ ๋“ค์„ ๋ฐฐ์น˜ํ•˜๊ณ , ๊ฐ„์„ ๋“ค์ด ์›์˜ ๋””์Šคํฌ ๋‚ด๋ถ€์—์„œ ์„œ๋กœ ๊ต์ฐจํ•˜์ง€ ์•Š๋„๋ก ๋ฐฐ์น˜๋  ์ˆ˜ ์žˆ๋Š” ๊ทธ๋ž˜

Mathematics Computer Science Discrete Mathematics
Reversibility in Massive Concurrent Systems

Reversibility in Massive Concurrent Systems

: ๋ณธ ๋…ผ๋ฌธ์€ ๋Œ€๊ทœ๋ชจ ๋ณ‘๋ ฌ ์‹œ์Šคํ…œ์—์„œ ์—ญ์ „ ๊ฐ€๋Šฅ์„ฑ์˜ ๊ฐœ๋…๊ณผ ๊ทธ ์ ์šฉ ๋ฒ”์œ„๋ฅผ ํƒ๊ตฌํ•˜๊ณ  ์žˆ๋‹ค. ์—ญ์ „ ๊ฐ€๋Šฅ์„ฑ์€ ์ž…๋ ฅ ๋ฐ์ดํ„ฐ๊ฐ€ ์ˆœ์ฐจ์ ์œผ๋กœ ์ฒ˜๋ฆฌ๋˜๋ฉด์„œ, ์ฒซ ๋ฒˆ์งธ ์ž…๋ ฅ์ด ๋‘ ๋ฒˆ์งธ ์ž…๋ ฅ ์—†์ด๋„ ๋ฐฉ์ถœ๋˜์–ด ๋‹ค๋ฅธ ์—ฐ์‚ฐ์ž์— ์˜ํ•ด ์‚ฌ์šฉ๋  ์ˆ˜ ์žˆ๋Š” ๋Šฅ๋ ฅ์„ ์˜๋ฏธํ•œ๋‹ค. ์ด๋Š” ๋ณ‘๋ ฌ ์‹œ์Šคํ…œ์—์„œ ํšจ์œจ์ ์ธ ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ์™€ ํ”„๋กœ์„ธ์‹ฑ์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•˜๋Š” ์ค‘์š”ํ•œ ํŠน์„ฑ์ด๋‹ค. ๋…ผ๋ฌธ์€ ์—ญ์ „ ๊ฐ€๋Šฅ์„ฑ์˜ ๊ตฌ์กฐ๋ฅผ ๋ถ„์„ํ•˜๋ฉด์„œ, ํŠนํžˆ ์ผ๊ด€์„ฑ ์ œ์•ฝ ์กฐ๊ฑด ํ•˜์—์„œ ๋‹ค์ค‘์„ฑ์ด ์ œ๊ฑฐ๋œ ์—ญ์ „ ๊ฐ€๋Šฅํ•œ ๊ตฌ์กฐ์— ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ๋‹ค. ์ด๋Š” ๋ณ‘๋ ฌ ์‹œ์Šคํ…œ ๋‚ด์—์„œ ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ ๊ณผ์ •์ด ์ผ๊ด€์„ฑ์„ ์œ ์ง€ํ•˜๋„๋ก ํ•˜๋Š” ์ค‘์š”ํ•œ

Formal Languages Distributed Computing Computer Science System
No Image

Greedy Set Cover Estimations

๋ณธ ๋…ผ๋ฌธ์€ ์ง‘ํ•ฉ ๋ฎ๊ธฐ ๋ฌธ์ œ(Set Cover Problem)์— ๋Œ€ํ•œ ์ƒˆ๋กœ์šด ์ ‘๊ทผ ๋ฐฉ์‹์„ ์ œ์•ˆํ•˜๋ฉฐ, ํŠนํžˆ ์ด์ง„ ํƒ์ƒ‰ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ด์šฉํ•œ ๊ทผ์‚ฌ ์•Œ๊ณ ๋ฆฌ์ฆ˜์˜ ๊ฐœ์„ ์ ์„ ๋‹ค๋ฃฌ๋‹ค. ์ง‘ํ•ฉ ๋ฎ๊ธฐ ๋ฌธ์ œ๋Š” NP ์™„์ „ ๋ฌธ์ œ๋กœ ์•Œ๋ ค์ ธ ์žˆ์–ด ์ •ํ™•ํ•œ ํ•ด๊ฒฐ์ฑ…์„ ์ฐพ๋Š” ๊ฒƒ์ด ๋งค์šฐ ์–ด๋ ต๋‹ค๋Š” ์ ์—์„œ ์ค‘์š”ํ•˜๋‹ค. ๋”ฐ๋ผ์„œ, ๋ณธ ๋…ผ๋ฌธ์€ ์ด ๋ฌธ์ œ๋ฅผ ํšจ๊ณผ์ ์œผ๋กœ ๊ทผ์‚ฌํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์‹œํ•จ์œผ๋กœ์จ ์‹ค์šฉ์ ์ธ ํ•ด๊ฒฐ์ฑ…์„ ์ œ๊ณตํ•œ๋‹ค. ๊ธฐ์กด ์ ‘๊ทผ ๋ฐฉ์‹์˜ ํ•œ๊ณ„ ๊ธฐ์กด์˜ ์ ‘๊ทผ ๋ฐฉ์‹์—์„œ๋Š” ๊ฐ ์—ด์— ์ตœ์†Œ m๊ฐœ์˜ 1์ด ์žˆ๋Š” (0,1) ํ–‰๋ ฌ๋กœ ์ง‘ํ•ฉ ๋ฎ๊ธฐ ๋ฌธ์ œ๋ฅผ ํ‘œํ˜„ํ•˜๊ณ , ์ด์ง„ ํƒ์ƒ‰์„ ํ†ตํ•ด ๊ฐ€์žฅ ๋งŽ์€ 1์„ ํฌํ•จํ•˜

Computer Science Discrete Mathematics
No Image

The M/M/Infinity Service System with Ranked Servers in Heavy Traffic

: ๋ณธ ๋…ผ๋ฌธ์€ ๋ฌดํ•œ ์„œ๋ฒ„ ์‹œ์Šคํ…œ์—์„œ ๊ณ ๊ฐ ์ฒ˜๋ฆฌ ๊ณผ์ •์„ ์ˆ˜ํ•™์ ์œผ๋กœ ํƒ๊ตฌํ•˜๋ฉฐ, ํŠนํžˆ Newell์ด ์ œ๊ธฐํ•œ ๊ท ํ˜• ์ƒํƒœ์—์„œ ์ƒˆ๋กœ์šด ๊ณ ๊ฐ์„ ์ฒ˜๋ฆฌํ•˜๋Š” ์„œ๋ฒ„์˜ ์ธ๋ฑ์Šค ๋ถ„ํฌ์— ๋Œ€ํ•œ ๋ฌธ์ œ๋ฅผ ๋‹ค๋ฃฌ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” ๊ธฐ์กด์˜ ๊ทผ์‚ฌ์‹๋“ค์— ๋Œ€ํ•œ ์—„๋ฐ€ํ•œ ์ฆ๋ช…๊ณผ ๋” ๋†’์€ ์ฐจ์ˆ˜์˜ ๋ถ„ํฌ๋ฅผ ํ™•๋ฆฝํ•˜๋Š”๋ฐ ์ดˆ์ ์„ ๋งž์ถ˜๋‹ค. ๋…ผ๋ฌธ์—์„œ ์ฃผ์š” ๊ด€์‹ฌ์‚ฌ๋Š” ๊ณ ๊ฐ์ด ๋„์ฐฉํ•  ๋•Œ ๊ฐ€์žฅ ๋‚ฎ์€ ์ธ๋ฑ์Šค๋ฅผ ๊ฐ€์ง„ ๋น„์–ด์žˆ๋Š” ์„œ๋ฒ„์— ํ• ๋‹น๋˜๋Š” ๊ณผ์ •์ด๋‹ค. ์ด๋Š” M/M/โˆž ์„œ๋น„์Šค ์‹œ์Šคํ…œ์ด๋ผ๊ณ  ์•Œ๋ ค์ ธ ์žˆ์œผ๋ฉฐ, ฮป โ†’ โˆž์˜ ํ•œ๊ณ„ ์ƒํ™ฉ์—์„œ ๊ด‘๋ฒ”์œ„ํ•˜๊ฒŒ ์—ฐ๊ตฌ๋˜์—ˆ๋‹ค. Newell์€ L์ด '

Performance Mathematics Computer Science System
No Image

A Novel Attack against Android Phones

๋ณธ ๋…ผ๋ฌธ์€ ์•ˆ๋“œ๋กœ์ด๋“œ ์Šค๋งˆํŠธํฐ์˜ ๋ณด์•ˆ ์ทจ์•ฝ์ ์„ ์ง‘์ค‘์ ์œผ๋กœ ๋ถ„์„ํ•˜๊ณ , ์ด๋ฅผ ์•…์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์ƒˆ๋กœ์šด ๊ณต๊ฒฉ ๊ธฐ๋ฒ•์„ ์ œ์‹œํ•ฉ๋‹ˆ๋‹ค. ์ด ์—ฐ๊ตฌ๋Š” 2011๋…„ 1๋ถ„๊ธฐ์— ๊ฐ€์žฅ ๋งŽ์ด ํŒ๋งค๋œ ์šด์˜์ฒด์ œ์ธ ์•ˆ๋“œ๋กœ์ด๋“œ๋ฅผ ๋Œ€์ƒ์œผ๋กœ ํ•˜๋ฉฐ, ํŠนํžˆ ์Šค๋งˆํŠธํฐ ์‚ฌ์šฉ์ž๋“ค์ด ์ง๋ฉดํ•˜๊ฒŒ ๋  ์ž ์žฌ์ ์ธ ์œ„ํ˜‘์— ๋Œ€ํ•ด ๊ฒฝ๊ฐ์‹ฌ์„ ๋ถˆ๋Ÿฌ์ผ์œผํ‚ค๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ทจ์•ฝ์ ์˜ ์‹ฌ๊ฐ์„ฑ ๋ณธ ๋…ผ๋ฌธ์—์„œ ์ œ์‹œ๋œ ๊ณต๊ฒฉ ๊ธฐ๋ฒ•์€ ๋งค์šฐ ์น˜๋ช…์ ์ž…๋‹ˆ๋‹ค. ์ด๋Š” ๋‹จ์ˆœํžˆ ์•…์„ฑ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ์„ค์น˜ํ•˜๋Š” ๋ฐ ๊ทธ์น˜์ง€ ์•Š๊ณ , ์‚ฌ์šฉ์ž์˜ ์ธ์‹ ์—†์ด ์ด๋ฃจ์–ด์ง‘๋‹ˆ๋‹ค. ์ฆ‰, ์‚ฌ์šฉ์ž๊ฐ€ ์–ด๋– ํ•œ ๊ถŒํ•œ๋„ ๋ถ€์—ฌํ•˜์ง€ ์•Š์•„๋„ ์•…์„ฑ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์ด ์ž๋™์œผ๋กœ ์„ค

Computer Science Cryptography and Security
No Image

The Degree Sequence of Random Apollonian Networks

๋ณธ ๋…ผ๋ฌธ์€ ๋žœ๋ค ์•„ํด๋กœ๋‹ˆ ๋„คํŠธ์›Œํฌ(RANs)์˜ ์ •๋„ ๋ถ„ํฌ์— ๋Œ€ํ•œ ๊นŠ์ด ์žˆ๋Š” ๋ถ„์„์„ ์ œ๊ณตํ•˜๋ฉฐ, ์ด๋Š” ๊ทธ๋ž˜ํ”„ ์ด๋ก ์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜๋Š” ๋ชจ๋ธ ์ค‘ ํ•˜๋‚˜์ด๋‹ค. RANs๋Š” ํ‰๋ฉด ๊ทธ๋ž˜ํ”„๋กœ์„œ, ๊ฐ ๋‹จ๊ณ„์—์„œ ๋ฌด์ž‘์œ„๋กœ ์‚ผ๊ฐํ˜•์„ ์„ ํƒํ•˜๊ณ  ๊ทธ ๋‚ด๋ถ€์— ์ƒˆ๋กœ์šด ์ •์ ์„ ์ถ”๊ฐ€ํ•˜์—ฌ ๋„คํŠธ์›Œํฌ๋ฅผ ํ™•์žฅํ•œ๋‹ค. 1. ์„œ๋ก  ์„œ๋ก ์—์„œ๋Š” ๋ณธ ๋…ผ๋ฌธ์˜ ์ฃผ์š” ๋ชฉํ‘œ์™€ ์—ฐ๊ตฌ ๋ฐฐ๊ฒฝ์ด ์„ค๋ช…๋œ๋‹ค. RANs๋Š”

Physics Network Mathematics Social Networks Computer Science
Weighted Radial Variation for Node Feature Classification

Weighted Radial Variation for Node Feature Classification

๋ณธ ๋…ผ๋ฌธ์€ ๋ณต์žกํ•œ ๋„คํŠธ์›Œํฌ์—์„œ ๋…ธ๋“œ ํŠน์„ฑ ๋ถ„๋ฅ˜์˜ ์ƒˆ๋กœ์šด ์ ‘๊ทผ๋ฒ•์ธ ๊ฐ€์ค‘ ๋ฐฉ์‚ฌ ๋ณ€์ด(WRV) ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. WRV๋Š” ๊ฐ ๋…ธ๋“œ์— ๋Œ€ํ•œ ๋ฒกํ„ฐ ํ๋ฆ„ ๊ตฌ์„ฑ์— ๊ธฐ๋ฐ˜ํ•˜์—ฌ, ์นด๋ฅด๋””๋‚˜๋ฆฌํ‹ฐ(๋…ธ๋“œ ๊ฐ„ ์—ฐ๊ฒฐ ์ˆ˜), ๋ฐฉํ–ฅ, ๊ธธ์ด, ๊ทธ๋ฆฌ๊ณ  ํ๋ฆ„ ํฌ๊ธฐ์˜ ์ธก๋ฉด์—์„œ ๋™๊ธฐํ™”๋œ ๊ฐ ์—”ํ‹ฐํ‹ฐ์˜ ๋ฒกํ„ฐ๋ฅผ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ๋ณต์žกํ•œ ๋„คํŠธ์›Œํฌ ๋ถ„์„์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜๋Š”๋ฐ, ํŠนํžˆ ๋น„์ธ์ ‘ ๊ณต๊ฐ„์— ์—ฐ๊ฒฐ๋˜๋Š” ์ธ๊ฐ„๊ณผ ์ •๋ณด ํ๋ฆ„์˜ ๋ณต์žกํ•œ ์—ญํ•™์„ ์ดํ•ดํ•˜๋Š” ๋ฐ ์œ ์šฉํ•ฉ๋‹ˆ๋‹ค. WRV ๊ณผ์ •์€ ๋ณ„ ๋ชจ์–‘ ์—”ํ‹ฐํ‹ฐ์˜ ๊ฐœ๋ณ„ ํ๋ฆ„ ๋ฒกํ„ฐ๋ฅผ 0 360ยฐ ์ŠคํŽ™ํŠธ๋Ÿผ์— ํŽผ์ณ ๋…ํŠนํ•œ ์‹ ํ˜ธ๋ฅผ ํ˜•์„ฑํ•˜๋ฉฐ, ์ด

Computer Science Computer Vision Physics
A Novel Template-Based Learning Model

A Novel Template-Based Learning Model

: ๋ณธ ๋…ผ๋ฌธ์€ ํ…œํ”Œ๋ฆฟ ๊ธฐ๋ฐ˜ ํ•™์Šต ๋ชจ๋ธ์„ ํ†ตํ•ด ์ƒˆ๋กœ์šด ๊ด€์ฐฐ ๋ฐ์ดํ„ฐ๋ฅผ ์ดํ•ดํ•˜๋Š” ๋ฐฉ๋ฒ•์— ๋Œ€ํ•ด ์„ค๋ช…ํ•˜๊ณ  ์žˆ๋‹ค. ์ด ๋ชจ๋ธ์€ ์ฃผ๋กœ ๊ด€์ฐฐ ๋ฐ์ดํ„ฐ ๊ฐ„์˜ ์œ ์‚ฌ์„ฑ ํƒ์ƒ‰๊ณผ ๋น„๊ต๋ฅผ ํ†ตํ•ด ์ƒˆ๋กœ์šด ๊ฐœ๋…์„ ํ•™์Šตํ•˜๊ณ  ์ถ”์ƒํ™”ํ•˜๋Š”๋ฐ ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ๋‹ค. 1. ํ…œํ”Œ๋ฆฟ ๊ธฐ๋ฐ˜ ํ•™์Šต ๋ชจ๋ธ์˜ ๊ตฌ์„ฑ ์š”์†Œ ๊ธฐํ•˜ํ•™์  ๋ฌ˜์‚ฌ : ์ด ๋ชจ๋ธ์€ ๊ด€์ฐฐ ๋ฐ์ดํ„ฐ๋ฅผ ๊ธฐํ•˜ํ•™์ ์œผ๋กœ ๋ฌ˜์‚ฌํ•˜๋Š” ๋ฐฉ์‹์„ ์‚ฌ์šฉํ•œ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๊ฐ์ฒด์˜ ๊ฒฝ๊ณ„์™€ ํ˜•ํƒœ๋ฅผ ์ •ํ™•ํ•˜๊ฒŒ ํŒŒ์•…ํ•  ์ˆ˜ ์žˆ๋‹ค. ์ธ๊ฐ„ ์‹œ๊ฐ ์‹ ๊ฒฝ ์‹œ์Šคํ…œ์— ์˜๊ฐ ๋ฐ›์€ ์„ค๋ช…์ž : ์ธ๊ฐ„์˜ ์‹œ๊ฐ ์ธ์ง€ ๊ณผ์ •์—์„œ ์ค‘์š”ํ•œ ์—ญํ• ์„ ํ•˜๋Š” ์š”์†Œ๋“ค์„ ๋ชจ๋ธ๋งํ•˜์—ฌ, ๋” ์ •๊ตํ•œ ๋ฐ์ดํ„ฐ

Model Machine Learning Computer Science Learning
Jancars formal system for deciding bisimulation of first-order grammars   and its non-soundness

Jancars formal system for deciding bisimulation of first-order grammars and its non-soundness

: 1. ์ฒซ ๋ฒˆ์งธ ์ˆœ์„œ ๋ฌธ๋ฒ•๊ณผ ํ–‰๋™ ์•ŒํŒŒ๋ฒณ์˜ ์ •์˜ ๋…ผ๋ฌธ์€ ์ฒซ ๋ฒˆ์งธ ์ˆœ์„œ ๋ฌธ๋ฒ•์— ๋Œ€ํ•œ ๋น„์‹œ๋ฎฌ๋ ˆ์ด์…˜ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด Jancar์˜ ํ˜•์‹ ์‹œ์Šคํ…œ์„ ๊ฒ€ํ† ํ•œ๋‹ค. ์ด ๊ณผ์ •์—์„œ ํ–‰๋™ ์•ŒํŒŒ๋ฒณ A์™€ ์ค‘๊ฐ„ ๋ผ๋ฒจ ์•ŒํŒŒ๋ฒณ T, ๊ทธ๋ฆฌ๊ณ  ๋งต LAB A: T โ†’ A๋ฅผ ์ •์˜ํ•œ๋‹ค. ์ด๋Ÿฌํ•œ ์ •์˜๋Š” ์ฒซ ๋ฒˆ์งธ ์ˆœ์„œ ๋ฌธ๋ฒ• G (N, A, R)์„ ๊ตฌ์„ฑํ•˜๋Š” ๋ฐ ํ•„์š”ํ•œ ๊ธฐ๋ณธ ์š”์†Œ๋ฅผ ์ œ๊ณตํ•˜๋ฉฐ, ์—ฌ๊ธฐ์„œ N์€ ๋น„ํ„ฐ๋ฏธ๋„ ์ง‘ํ•ฉ, A๋Š” ํ–‰๋™ ์•ŒํŒŒ๋ฒณ, ๊ทธ๋ฆฌ๊ณ  R์€ ๊ทœ์น™ ์ง‘ํ•ฉ์ด๋‹ค. 2. Jancar ํ˜•์‹ ์‹œ์Šคํ…œ์˜ ๊ฐœ์š” Jancar์˜ ํ˜•์‹ ์‹œ์Šคํ…œ์€

Computer Science Formal Languages Logic System
Casting Robotic End-effectors To Reach Faraway Moving Objects

Casting Robotic End-effectors To Reach Faraway Moving Objects

๋ณธ ๋…ผ๋ฌธ์€ ๋กœ๋ด‡ ์—”๋“œ ์ดํŽ™ํ„ฐ๊ฐ€ ๋ฉ€๋ฆฌ ๋–จ์–ด์ง„ ์›€์ง์ด๋Š” ๋ฌผ์ฒด๋ฅผ ์žก๋Š” ๋ฌธ์ œ์— ๋Œ€ํ•œ ํ˜์‹ ์ ์ธ ์ ‘๊ทผ๋ฒ•์„ ์ œ์‹œํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๊ธฐ์กด์˜ ์บ์ŠคํŒ… ์กฐ์ž‘์ด ๊ณ ์ •๋œ ๋ฌผ์ฒด๋ฅผ ๋Œ€์ƒ์œผ๋กœ ํ•œ ๊ฒƒ๊ณผ ๋‹ฌ๋ฆฌ, ๋ณธ ๋…ผ๋ฌธ์€ 3์ฐจ์› ๊ณต๊ฐ„์—์„œ ์›€์ง์ด๋Š” ํƒ€๊ฒŸ์„ ์žก๋Š” ๋ฐ ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. 1. ์บ์ŠคํŒ… ์กฐ์ž‘์˜ ์›๋ฆฌ์™€ ์ ์šฉ ์บ์ŠคํŒ… ์กฐ์ž‘์€ ๊ฐ€๋ฒผ์šด ์ผ€์ด๋ธ”์„ ํ†ตํ•ด ์—ฐ๊ฒฐ๋œ ์—”๋“œ ์ดํŽ™ํ„ฐ๋ฅผ ๋˜์ ธ ๋ฉ€๋ฆฌ ๋–จ์–ด์ง„ ์œ„์น˜์— ๋ฐฐ์น˜ํ•˜๋Š” ๊ธฐ์ˆ ์ž…๋‹ˆ๋‹ค. ์ด๋Š” ๋กœ๋ด‡์ด ์ง์ ‘ ์ ‘๊ทผํ•˜๊ธฐ ์–ด๋ ค์šด ๊ฑฐ๋ฆฌ๋ฅผ ๊ทน๋ณตํ•  ์ˆ˜ ์žˆ๋Š” ๋ฐฉ๋ฒ•์œผ๋กœ, ํŠนํžˆ ์›๊ฒฉ ์ƒ˜ํ”Œ ํš๋“ ๋ฐ ๋ฐ˜ํ™˜, ๊ตฌ์กฐ ๋“ฑ ๋‹ค์–‘ํ•œ ์‘์šฉ ๋ถ„์•ผ์—์„œ ํ™œ์šฉ ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค.

Computer Science Robotics
Distributed Collision-free Protocol for AGVs in Industrial Environments

Distributed Collision-free Protocol for AGVs in Industrial Environments

: ๋ณธ ๋…ผ๋ฌธ์€ ์‚ฐ์—… ํ™˜๊ฒฝ์—์„œ ์ž์œจ ์ด๋™ ์ฐจ๋Ÿ‰(AGVs) ๊ทธ๋ฃน์˜ ์•ˆ์ „ํ•˜๊ณ  ํšจ์œจ์ ์ธ ๊ด€๋ฆฌ๋ฅผ ์œ„ํ•œ ๋ถ„์‚ฐ ์ถฉ๋Œ ๋ฐฉ์ง€ ํ”„๋กœํ† ์ฝœ์„ ์ œ์•ˆํ•œ๋‹ค. ์ด๋Š” ๋™์  ํ™˜๊ฒฝ์—์„œ AGVs๊ฐ€ ๋ฏธ๋ฆฌ ์ •์˜๋œ ๊ฒฝ๋กœ๋ฅผ ๋”ฐ๋ผ ์ด๋™ํ•˜๋ฉด์„œ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ๋‹ค์–‘ํ•œ ๋ฌธ์ œ๋“ค์„ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๊ณ ์•ˆ๋˜์—ˆ๋‹ค. 1. ๋ถ„์‚ฐ ์กฐ์ • ์•Œ๊ณ ๋ฆฌ์ฆ˜ ์ œ์•ˆ๋œ ๋ถ„์‚ฐ ์กฐ์ • ์•Œ๊ณ ๋ฆฌ์ฆ˜์€ ๊ณต์œ  ์ž์› ํ”„๋กœํ† ์ฝœ๊ณผ ์žฌ๊ณ„ํš ์ „๋žต์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•œ๋‹ค. ์ด๋Š” AGVs๊ฐ€ ๋™์ผํ•œ ๊ฒฝ๋กœ๋ฅผ ๋”ฐ๋ผ ์ด๋™ํ•˜๊ฑฐ๋‚˜ ๊ต์ฐจํ•˜๋Š” ๊ฒฝ์šฐ์— ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋Š” ์ถฉ๋Œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ๊ฒƒ์ด๋‹ค. ๋˜ํ•œ, ๊ต์ฐฉ ์ƒํƒœ(์‹œ์Šคํ…œ์ด ์ •์ง€๋œ ์ƒํƒœ)์™€ ์‚ด๋ก(๋ชฉ์ ์ง€ ๋„๋‹ฌ

Robotics Computer Science
Distributed Consensus on Set-valued Information

Distributed Consensus on Set-valued Information

: ๋ณธ ๋…ผ๋ฌธ์€ ๋ถ„์‚ฐ ์—์ด์ „ํŠธ ์‹œ์Šคํ…œ์—์„œ ์ •๋ณด์˜ ์ˆ˜๋ ด์„ ์—ฐ๊ตฌํ•˜๋Š” ๋ฐ ์ดˆ์ ์„ ๋งž์ถ”๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ํŠนํžˆ, ์ด ์—ฐ๊ตฌ๋Š” ๊ธฐ์กด์— ์‹ค์ˆ˜๋กœ ํ‘œํ˜„๋˜๋˜ ์ •๋ณด๋ฅผ ์ง‘ํ•ฉ์œผ๋กœ ํ‘œํ˜„ํ•จ์œผ๋กœ์จ ์ƒˆ๋กœ์šด ๊ด€์ ๊ณผ ์ ‘๊ทผ ๋ฐฉ์‹์„ ์ œ์‹œํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ ‘๊ทผ์€ ๋ถ„์‚ฐ ์‹œ์Šคํ…œ ๋‚ด์—์„œ ์—์ด์ „ํŠธ๋“ค์ด ์–ด๋–ป๊ฒŒ ์ƒํ˜ธ ์ž‘์šฉํ•˜๋ฉฐ ์ •๋ณด๋ฅผ ๊ณต์œ ํ•˜๊ณ  ์ˆ˜๋ ดํ•˜๋Š”์ง€๋ฅผ ๋ณด๋‹ค ์ •๊ตํ•˜๊ฒŒ ์ดํ•ดํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•ฉ๋‹ˆ๋‹ค. ๋…ผ๋ฌธ์—์„œ๋Š” ์ง‘ํ•ฉ์˜ ๋™์—ญํ•™์„ ๋ถ€์šธ ๋งต ํด๋ž˜์Šค๋กœ ํ‘œํ˜„ํ•ฉ๋‹ˆ๋‹ค. ์ด๋Š” ์—ฐํ•ฉ, ๊ต์ง‘ํ•ฉ, ๊ทธ๋ฆฌ๊ณ  ๋ณด์™„์ด๋ผ๋Š” ์„ธ ๊ฐ€์ง€ ๊ธฐ๋ณธ์ ์ธ ์ง‘ํ•ฉ ์—ฐ์‚ฐ๋งŒ์œผ๋กœ ๊ตฌ์„ฑ๋ฉ๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ œํ•œ๋œ ์ง‘ํ•ฉ ์—ฐ์‚ฐ์€ ๋ณต์žก์„ฑ์„ ์ค„์ด๋ฉด์„œ๋„ ํ•ต์‹ฌ

Robotics Computer Science
Distributed Intrusion Detection for the Security of Societies of Robots

Distributed Intrusion Detection for the Security of Societies of Robots

๋ณธ ๋…ผ๋ฌธ์€ ์ž์œจ ๋กœ๋ด‡ ์ง‘๋‹จ ๋‚ด์—์„œ ์ž ์žฌ์  ์นจ์ž…์ž๋ฅผ ๊ฐ์ง€ํ•˜๋Š” ๋ฌธ์ œ๋ฅผ ๋‹ค๋ฃจ๋ฉฐ, ์ด๋Š” ๋ถ„์‚ฐ ํ™˜๊ฒฝ์—์„œ์˜ ๋ณด์•ˆ ๋ฌธ์ œ ํ•ด๊ฒฐ์„ ์œ„ํ•œ ์ค‘์š”ํ•œ ์—ฐ๊ตฌ์ž…๋‹ˆ๋‹ค. ์ฃผ์š” ๋‚ด์šฉ๊ณผ ๊ทธ ์ค‘์š”์„ฑ์„ ๋‹ค์Œ๊ณผ ๊ฐ™์ด ๋ถ„์„ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. 1. ์นจ์ž…์ž ์ •์˜์™€ ๊ฐ์ง€ ๋ฐฉ๋ฒ• ๋…ผ๋ฌธ์€ ์นจ์ž…์ž๋ฅผ ์ž์œจ์ ์œผ๋กœ ํ–‰๋™ํ•˜์ง€ ์•Š๋Š” ๋กœ๋ด‡์œผ๋กœ ์ •์˜ํ•˜๋ฉฐ, ์ด๋Š” ๊ณ ์žฅ์ด๋‚˜ ์•…์˜์ ์ธ ์žฌํ”„๋กœ๊ทธ๋ž˜๋ฐ ๋“ฑ ๋‹ค์–‘ํ•œ ์›์ธ์— ์˜ํ•ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๊ฐœ๋ณ„ ๋กœ๋ด‡์ด ์ž์‹ ์˜ ์ƒํƒœ์™€ ์ธ์ ‘ํ•œ ์ด์›ƒ๊ณผ์˜ ํ†ต์‹ ์„ ํ†ตํ•ด ์ •๋ณด๋ฅผ ์ˆ˜์ง‘ํ•˜๊ณ  ์ด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์นจ์ž…์ž๋ฅผ ๊ฐ์ง€ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•ฉ๋‹ˆ๋‹ค. 2. ๋ถ„์‚ฐ ํ™˜๊ฒฝ

Detection Robotics Computer Science
Logical Consensus for Distributed and Robust Intrusion Detection

Logical Consensus for Distributed and Robust Intrusion Detection

๋ณธ ๋…ผ๋ฌธ์€ ๋„คํŠธ์›Œํฌ ๋‚ด์—์„œ ์—์ด์ „ํŠธ๋“ค์ด ์ง€์—ญ์ ์œผ๋กœ ์ˆ˜์ง‘ํ•œ ์ •๋ณด๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์ „๋ฐ˜์ ์ธ ์œ„ํ˜‘์— ๋Œ€ํ•œ ํ•ฉ์˜๋ฅผ ๋„์ถœํ•˜๋Š” ์ƒˆ๋กœ์šด ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์ด๋Š” ํŠนํžˆ ๋ถ„์‚ฐ ํ™˜๊ฒฝ์—์„œ ๊ฐ ๋…ธ๋“œ๊ฐ€ ๋…๋ฆฝ์ ์œผ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ๋Š” ๋Šฅ๋ ฅ์„ ๊ฐ•ํ™”ํ•จ์œผ๋กœ์จ, ๋„คํŠธ์›Œํฌ ์ „์ฒด์˜ ์•ˆ์ •์„ฑ๊ณผ ๋ณด์•ˆ์„ฑ์„ ํ–ฅ์ƒ์‹œํ‚ค๋Š”๋ฐ ์ค‘์ ์„ ๋‘๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๋…ผ๋ฌธ์€ ๋…ผ๋ฆฌ์  ํ•ฉ์˜ ๋ฌธ์ œ๋ฅผ ์ •์˜ํ•˜๊ณ , ์ด๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ๊ธฐ์กด ์—ฐ๊ตฌ ๊ฒฐ๊ณผ๋“ค์„ ๊ฒ€ํ† ํ•ฉ๋‹ˆ๋‹ค. ํŠนํžˆ ์„ธํฌ ์ž๋™์ฒด์™€ ์œ ํ•œ ์ƒํƒœ ์ดํ„ฐ๋ ˆ์ด์…˜ ๋งต์˜ ์ˆ˜๋ ด์„ฑ์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋Š” ์—์ด์ „ํŠธ๋“ค์ด ์ง€์—ญ์ ์œผ๋กœ ์ˆ˜์ง‘ํ•œ ์ •๋ณด๋ฅผ ์ „๋ฐ˜์ ์ธ ํ•ฉ์˜๋กœ ์—ฐ๊ฒฐํ•˜๋Š” ๋ฐ ์ค‘์š”ํ•œ ์—ญํ• ์„

Detection Robotics Computer Science
Personalized Event-Based Surveillance and Alerting Support for the   Assessment of Risk

Personalized Event-Based Surveillance and Alerting Support for the Assessment of Risk

์ด ๋…ผ๋ฌธ์€ ๊ณต๊ณต ๋ณด๊ฑด ๋ถ„์•ผ์—์„œ ์ค‘์š”ํ•œ ๋ฌธ์ œ์ธ ๊ณผ๋ถ€ํ•˜๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ์ด๋ฒคํŠธ ๊ธฐ๋ฐ˜ ๊ฐ์‹œ ์‹œ์Šคํ…œ์˜ ๊ฐœ์„  ๋ฐฉ์•ˆ์„ ์ œ์‹œํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ํŠนํžˆ, ์ „์—ผ๋ณ‘ ๋ชจ๋‹ˆํ„ฐ๋ง๊ณผ ๊ด€๋ จ๋œ ์ •๋ณด๊ฐ€ ๊ธ‰์ฆํ•จ์— ๋”ฐ๋ผ ์ด๋ฅผ ํšจ๊ณผ์ ์œผ๋กœ ๊ด€๋ฆฌํ•˜๋Š” ๊ฒƒ์ด ์ ์  ๋” ์ค‘์š”ํ•ด์ง€๊ณ  ์žˆ๋Š” ์ƒํ™ฉ์—์„œ, ๊ณต๋ฌด์›๋“ค์ด ํ•„์š”ํ•œ ์ •๋ณด๋ฅผ ๋น ๋ฅด๊ณ  ์ •ํ™•ํ•˜๊ฒŒ ํŒŒ์•…ํ•  ์ˆ˜ ์žˆ๋„๋ก ๋•๋Š” ๋ฐฉ๋ฒ•์„ ์ œ์•ˆํ•˜๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ๋…ผ๋ฌธ์€ ๋‘ ๊ฐ€์ง€ ์ฃผ์š” ๊ธฐ๋ฒ•์„ ์†Œ๊ฐœํ•ฉ๋‹ˆ๋‹ค. ์ฒซ ๋ฒˆ์งธ๋กœ, ์‚ฌ์šฉ์ž์˜ ์„ ํ˜ธ๋„์— ๋”ฐ๋ผ ์‹ ํ˜ธ๋ฅผ ํ•„ํ„ฐ๋งํ•˜๋Š” ๋ฐฉ๋ฒ•์ž…๋‹ˆ๋‹ค. ์ด๋Š” ๊ณต๋ฌด์›๋“ค์ด ํ•„์š”ํ•˜์ง€ ์•Š์€ ์ •๋ณด๋‚˜ ๋…ธ์ด์ฆˆ๋กœ๋ถ€ํ„ฐ ํ•ด๋ฐฉ๋˜์–ด ์ค‘์š”ํ•œ ๊ฒฝ๋ณด์™€ ๋ณด๊ณ ์„œ์— ์ง‘์ค‘ํ•  ์ˆ˜

Computers and Society Computer Science

< Category Statistics (Total: 793) >

Electrical Engineering and Systems Science
7
General
272
General Relativity
9
HEP-EX
7
HEP-PH
12
HEP-TH
7
MATH-PH
4
NUCL-TH
1
Quantum Physics
11

Start searching

Enter keywords to search articles

โ†‘โ†“
โ†ต
ESC
โŒ˜K Shortcut