We consider a portfolio of products in which each product probabilistically transitions through various life cycle stages. The evolution through these life cycle stages is impacted …
Intrusion Response Systems (IRSs) have been a major research topic in the last decade. At the core of an IRS is the response selection algorithm, which selects the best response …
In this paper, we propose quality-of-service (QoS) based resource allocation (RA) schemes for energy harvesting (EH) systems. We consider a system model with a single source and …
J Shin, JH Lee - Computers & Chemical Engineering, 2016 - Elsevier
Inventory management of procurement system is decomposed into sub-problems according to the timescale of decisions: the long-term planning for ordering raw materials and the short …
Abstract Policy Iteration (PI)(Howard 1960) is a classical method for computing an optimal policy for a finite Markov Decision Problem (MDP). The method is conceptually simple …
In mobile social networks, mobile users may help each other transfer contents when they move and meet each other. In this paper, we consider a mobile publish-subscribe network in …
We study optimal monitor placement for intrusion detection in networks with persistent attackers. The problem is modeled as a stochastic game in which the attacker attempts to …
H Rong, P Hyunchul, Y Wu - US Patent 9,239,712, 2016 - Google Patents
Apparatuses and methods may provide for determining a level of performance for processing one or more loops by a dynamic compiler and executing code optimizations to …
Policy Iteration (PI) is a widely-used family of algorithms for computing an optimal policy for a given Markov Decision Problem (MDP). Starting with an arbitrary initial policy, PI repeatedly …