期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Measuring Musical Rhythm Similarity: Further Experiments with the Many-to-Many Minimum-Weight Matching Distance
1
作者 Godfried T. Toussaint Seung Man Oh 《Journal of Computer and Communications》 2016年第15期117-125,共10页
Musical rhythms are represented as sequences of symbols. The sequences may be composed of binary symbols denoting either silent or monophonic sounded pulses, or ternary symbols denoting silent pulses and two types of ... Musical rhythms are represented as sequences of symbols. The sequences may be composed of binary symbols denoting either silent or monophonic sounded pulses, or ternary symbols denoting silent pulses and two types of sounded pulses made up of low-pitched (dum) and high-pitched (tak) sounds. Experiments are described that compare the effectiveness of the many-to-many minimum-weight matching between two sequences to serve as a measure of similarity that correlates well with human judgements of rhythm similarity. This measure is also compared to the often used edit distance and to the one-to-one minimum-weight matching. New results are reported from experiments performed with three widely different datasets of real- world and artificially generated musical rhythms (including Afro-Cuban rhythms), and compared with results previously reported with a dataset of Middle Eastern dum-tak rhythms. 展开更多
关键词 Musical Rhythms Rhythm Similarity Measures many-to-many Minimum-Weight Matching Edit Distance One-to-One Minimum-Weight Matching Rhythm Perception Afro-Cuban Rhythms Middle Eastern Rhythms
下载PDF
A Caching Strategy Based on Many-to-Many Matching Game in D2D Networks 被引量:1
2
作者 Kaihang Yu Zhonggui Ma +1 位作者 Runyu Ni Tao Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2021年第6期857-868,共12页
Wireless edge caching has been proposed to reduce data traffic congestion in backhaul links, and it is being envisioned as one of the key components of next-generation wireless networks. This paper focuses on the infl... Wireless edge caching has been proposed to reduce data traffic congestion in backhaul links, and it is being envisioned as one of the key components of next-generation wireless networks. This paper focuses on the influences of different caching strategies in Device-to-Device(D2D) networks. We model the D2D User Equipments(DUEs) as the Gauss determinantal point process considering the repulsion between DUEs, as well as the caching replacement process as a many-to-many matching game. By analyzing existing caching placement strategies, a new caching strategy is proposed, which represents the preference list of DUEs as the ratio of content popularity to cached probability. There are two distinct features in the proposed caching strategy.(1) It can cache other contents besides high popularity contents.(2) It can improve the cache hit ratio and reduce the latency compared with three caching placement strategies: Least Recently Used(LRU), Equal Probability Random Cache(EPRC), and the Most Popular Content Cache(MPC). Meanwhile, we analyze the effect of caching on the system performance in terms of different content popularity factors and cache capacity. Simulation results show that our proposed caching strategy is superior to the three other comparison strategies and can significantly improve the cache hit ratio and reduce the latency. 展开更多
关键词 caching strategy Device-to-Device(D2D)networks Gauss determinantal point process many-to-many matching game
原文传递
Binary Operations for the Lattice Structure in a Many-to-Many MatchingModel
3
作者 Paola Belén Manasero 《Journal of the Operations Research Society of China》 EI CSCD 2021年第1期207-228,共22页
The lattice structure of the set of stable matchings in many-to-many matching model is well known in literature.If preferences of the agents are substitutable,this result can be obtained by fixed-point methods,for tha... The lattice structure of the set of stable matchings in many-to-many matching model is well known in literature.If preferences of the agents are substitutable,this result can be obtained by fixed-point methods,for that purpose an algorithm for finding a fixed-point matching is defined.Since the fixed-point set equals the set of stable matchings,the latter has a lattice structure too.In this paper,we consider a many-to-many matching market where the preferences of firms satisfy substitutability and the law of aggregate demand,and workers have responsive preferences.In this many-to-many matching market,we explicitly compute for any pair of stable matchings the least upper bound and the greatest lower bound,without using fixed-point methods. 展开更多
关键词 many-to-many matching model Binary operations Lattice structure
原文传递
基于Hibernate的关联映射研究 被引量:2
4
作者 黄义平 刘薛蒂 李斌勇 《软件导刊》 2009年第6期162-164,共3页
在开发J2EE应用系统中,在进行数据库操作时,使用传统的JDBC来处理数据对象之间的关联关系会非常繁琐。Hibernate通过O/R Mapping将表间关系转化为实体之间的关系,这种关系通过在映射文件中加以声明,较简单地解决了这个问题。Hibernate... 在开发J2EE应用系统中,在进行数据库操作时,使用传统的JDBC来处理数据对象之间的关联关系会非常繁琐。Hibernate通过O/R Mapping将表间关系转化为实体之间的关系,这种关系通过在映射文件中加以声明,较简单地解决了这个问题。Hibernate的关联映射包括一对一,一对多,多对多3种。对这3种关联关系进行系统的分析研究,使得读者对Hibernate的关联映射有一定了解。 展开更多
关键词 HIBERNATE O/R MAPPING one—to—one one-to-many many-to-many J2EE应用系统
下载PDF
Trust Access Authentication in Vehicular Network Based on Blockchain 被引量:10
5
作者 Shaoyong Guo Xing Hu +3 位作者 Ziqiang Zhou Xinyan Wang Feng Qi Lifang Gao 《China Communications》 SCIE CSCD 2019年第6期18-30,共13页
Data sharing and privacy securing present extensive opportunities and challenges in vehicular network.This paper introducestrust access authentication scheme’as a mechanism to achieve real-time monitoring and promote... Data sharing and privacy securing present extensive opportunities and challenges in vehicular network.This paper introducestrust access authentication scheme’as a mechanism to achieve real-time monitoring and promote collaborative sharing for vehicles.Blockchain,which can provide secure authentication and protected privacy,is a crucial technology.However,traditional cloud computing performs poorly in supplying low-latency and fast-response services for moving vehicles.In this situation,edge computing enabled Blockchain network appeals to be a promising method,where moving vehicles can access storage or computing resource and get authenticated from Blockchain edge nodes directly.In this paper,a hierarchical architecture is proposed consist of vehicular network layer,Blockchain edge layer and Blockchain network layer.Through a authentication mechanism adopting digital signature algorithm,it achieves trusted authentication and ensures valid verification.Moreover,a caching scheme based on many-to-many matching is proposed to minimize average delivery delay of vehicles.Simulation results prove that the proposed caching scheme has a better performance than existing schemes based on central-ized model or edge caching strategy in terms of hit ratio and average delay. 展开更多
关键词 blockchain vehicular network EDGE COMPUTING AUTHENTICATION MECHANISM many-to-many MATCHING
下载PDF
Resource Allocation Strategy Based on Matching Game
6
作者 DENG Xu ZHU Lidong 《ZTE Communications》 2020年第4期10-17,共8页
With the development of satellite communication technology,the traditional resource allocation strategies are difficult to meet the requirements of resource utilization efficiency.In order to solve the optimization pr... With the development of satellite communication technology,the traditional resource allocation strategies are difficult to meet the requirements of resource utilization efficiency.In order to solve the optimization problem of resource allocation for multi-layer satellite networks in multi-user scenarios,we propose a new resource allocation scheme based on the many-to-many matching game.This scheme is different from the traditional resource allocation strategies that just consider a trade-off between the new call blocking probability and the handover call failure probability.Based on different preference lists among different layers of medium earth orbit(MEO) satellites,low earth orbit(LEO) satellites,base stations and users,we propose the corresponding algorithms from the perspective of quality of experience(QoE).The simulation results show that the many-to-many matching game scheme can effectively improve both the resource utilization efficiency and QoE,compared with the one-to-one and many-to-one matching algorithms. 展开更多
关键词 satellite network resource allocation many-to-many matching game preference lists quality of experience
下载PDF
Volunteer rescue dispatch during the Coronavirus Disease 2019 epidemic:Using the recruitment of volunteers for pneumonia epidemic prevention and control in Chun’an County as an example
7
作者 Liting Chen Shengqun Chen +1 位作者 Jing Zheng Jianqing Gao 《Journal of Safety Science and Resilience》 EI CSCD 2022年第4期330-339,共10页
To solve the problem of volunteer dispatch during the Coronavirus Disease 2019(COVID-19)epidemic,a many-to-many two-sided matching volunteer dispatch method based on an improved predator-search algorithm is pro-posed.... To solve the problem of volunteer dispatch during the Coronavirus Disease 2019(COVID-19)epidemic,a many-to-many two-sided matching volunteer dispatch method based on an improved predator-search algorithm is pro-posed.First,different evaluation index sets for volunteers and rescue tasks were developed,and weightings were determined using the analytic hierarchy process.Subsequently,the actual and expected values of the different indicators of the two parties were determined,and the triangular fuzzy number was used to calculate the satis-faction of the two parties.Based on this number,we used a linear weighting method to calculate the combined satisfaction and build a many-to-many two-sided matching model according to the demands of both parties.Sub-sequently,an improved predator-search algorithm was used to solve the model.Finally,taking the recruitment of volunteers for pneumonia epidemic prevention and control in Chun’an County as an example,the method proposed in our study was verified.A comparison and analysis of the results further demonstrated the feasibility and advantages of this method. 展开更多
关键词 VOLUNTEER many-to-many Two-sided matching Predator-search algorithm
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部