Recent Additions
- Some of the metrics are blocked by yourconsent settings
Publication Faster Approximation Algorithms for computing shortest cycles on weighted graphs(2019)Given an n-vertex m-edge graph G with non-negative edge-weights, a shortest cycle of G is one minimizing the sum of the weights on its edges. The girth of G is the weight of such a shortest cycle. We obtain several new approximation algorithms for computing the girth of weighted graphs: - For any graph G with polynomially bounded integer weights, we present a deterministic algorithm that computes, in O~(n^{5/3}+m)-time, a cycle of weight at most twice the girth of G. This matches both the approximation factor and - almost - the running time of the best known subquadratic-time approximation algorithm for the girth of unweighted graphs. - Then, we turn our algorithm into a deterministic (2+epsilon)-approximation for graphs with arbitrary non-negative edge-weights, at the price of a slightly worse running-time in O~(n^{5/3}polylog(1/epsilon)+m). For that, we introduce a generic method in order to obtain a polynomial-factor approximation of the girth in subquadratic time, that may be of independent interest. - Finally, if we assume that the adjacency lists are sorted then we can get rid off the dependency in the number m of edges. Namely, we can transform our algorithms into an O~(n^{5/3})-time randomized 4-approximation for graphs with non-negative edge-weights. This can be derandomized, thereby leading to an O~(n^{5/3})-time deterministic 4-approximation for graphs with polynomially bounded integer weights, and an O~(n^{5/3}polylog(1/epsilon))-time deterministic (4+epsilon)-approximation for graphs with non-negative edge-weights. To the best of our knowledge, these are the first known subquadratic-time approximation algorithms for computing the girth of weighted graphs. - Some of the metrics are blocked by yourconsent settings
Publication My cloudy time machine: a scalable microservice-based platform for data processing in cloud-edge systems: a proof of concept for the ROBIN-cloud project(ACM, 2019)As Cloud computing is a very well developed domain, many companies tend to move their entire activity in Cloud. At the same time, there is a tendency to move some of the data processing from Cloud to Edge as close as possible to the end devices. One main advantage of this approach is minimizing the latency in communication between the end devices and Cloud. Better usage of on premise devices is also a good achievement of the Edge offload. In this paper, we propose an architecture for applications that are connected to ROBIN-Cloud or to a general Cloud. We present how we have encapsulated Python-based microservices in Docker containers. We provide an implementation for the My Cloudy Time Machine application - GIGEL (Guided Intelligent GEared Legend), a nearby autonomous assistive robot. We use this prototype to evaluate the scalability of the proposed architecture. We also present results that show how to gain high performance by tuning a container-based embedded system. - Some of the metrics are blocked by yourconsent settings
Publication Advanced Methods to Extract Value from Scientific Datasets(Springer, 2019)In these days the scientific community is times bigger comparing with the previous centuries. The need of powerful tools to aggregate and analyse the information about articles, books and other publications becomes greater with each published paper. In this paper we describe a solution for understanding and leveraging this data. The platform integrates the following requirements: data aggregation, data analysis (visualizations, dashboards, graphs), complex and simple searches, and support for data export. The platform brings value to its users due to various reasons such as quick identification of relevant data and in depth analysis on the provided input. Another key feature is the granularity, application being easily configurable for rigorous use cases: just one author, a group of authors or an entire scientific field. - Some of the metrics are blocked by yourconsent settings
Publication Next generation IoT and its influence on decision-making. An illustrative case study(Elsevier, 2019)The next generation of IoT is characterized by the usage of smart solutions with embedded intelligence at the edge that relies on high connectivity, processing capabilities for edge devices and real-time analysis of information. This evolution is based on the convergence of some key ICT technologies like hyperconnectivity and new network architectures, edge computing, artificial intelligence, and blockchain. Considering the high expectations regarding the wide use in various domains of the new, interoperable IoT platforms built on these technologies, it is assumed that they will influence also the decision-making processes specific to these domains. The paper provides a short overview of these technologies with the aim to identify such potential influences. Then a case study in the field of health monitoring is presented, which consists in proposing a new version of a current pilot solution built around the sensing service offer integrator role. This new version is compliant with the RO-Smart Ageing architecture and will provide specific support for all three decision levels implemented in the medical unit practice, with special emphases on risk evaluation in real time monitoring regime. - Some of the metrics are blocked by yourconsent settings
Publication The 4-Steiner Root Problem(2019)The k th-power of a graph G is obtained by adding an edge between every two distinct vertices at a distance ≤ k in G. We call G a k-Steiner power if it is an induced subgraph of the k th-power of some tree T. In particular, G is a k-leaf power if all vertices in V (G) are leaf-nodes of T. Our main contribution is a polynomial-time recognition algorithm of 4-Steiner powers, thereby extending the decade-year-old results of (Lin, Kearney and Jiang, ISAAC’00) for k = 1, 2 and (Chang and Ko, WG’07) for k = 3. As a byproduct, we give the first known polynomial-time recognition algorithm for 6-leaf powers. Our work combines several new algorithmic ideas that help us overcome the previous limitations on the usual dynamic programming approach for these problems.
Most viewed
- Some of the metrics are blocked by yourconsent settings
Publication Routing in Post-Disaster Scenarios(Springer International Publishing, 2020)Current networks should provide disaster-resilience by coping with the possible failures and misbehaviours caused by massive natural or man-made disasters. This is necessary to keep a suitable level of Quality of Service after a disaster and to support the possible evacuation, rescue, assessment, and rescue operations within the affected area. Multiple possible methods and solutions can be put in place in a proactive and/or reactive manner to offer the required resilience degree. Among them, a proper routing algorithm can contribute to circumventing network elements damaged by the disaster or applying for spatial/temporal redundancy to guarantee effective communications. This chapter aims at presenting the main routing solutions to offer disaster-resilience communications, along with some related methods. - Some of the metrics are blocked by yourconsent settings
Publication On the Social Network Centrality Principle for Human Centric Efficiency(IWCMC, 2020)The use of Social Network Centrality alongside Content Centric Networking is used towards improving user's access to content, as well as maximizing the efficient exploitation of network resources. This work demonstrates how online Social Network Centrality can be used with content centric solutions for efficient content distribution in AAL environments. The benefits of this approach are highlighted, by conducting simulations and providing results on the performance of the proposed research approach. In particular, this work shows how the proposed resource allocation method improves the regular IP-based content delivery allocation in the distribution of content. Facebook data is used as a super-set of AAL data, in order to map users to a network graph and using their social proximity to determine where content can be effectively cached. The efficiency of the proposed scheme is validated for its performance through simulations, indicating the level of the offered efficiency in contrast to content distribution. - Some of the metrics are blocked by yourconsent settings
Publication IT Solutions Designed for the Management of Activities in the Romanian Public Institutions(ICI, 2020-01-31)This paper presents an extended research in the field of optimization intended for organizational processes undertaken by the Romanian public entities. Among other objectives, this paper aims at developing the main components (modules) of an integrated information system designed for the management of activities (IISMA), that would enable Romanian public institutions to better manage the ever increasing flow of information by making use of their own resources and specific activities, as well as the functional software modules and the open-source applications. The system is flexible, versatile and transparent in terms of access and location of information, data replication and updating in distributed databases, control procedures, transfer of data, ensuring the feedback for a continuous comparison and evaluation of the actions undertaken in relation to what has previously been planned. IISMA is based on open – source solutions and functional software modules, which aim to reduce the complexity of the conceptual separation between strategic decision and operational activities. - Some of the metrics are blocked by yourconsent settings
Publication Cyber Security approaches in e-Learning(INTED, 2020)Along with the advent of the “e-” revolution that began in the 2000s, came the issue of cyber security, cyber-attacks and cyber threats concerning domains included, but not limited to e-Business, eGovernment, e-Commerce, etc. As the issue of cyber security in e-Learning is less explored, this paper intends to illustrate approaches that will focus on the management of cyber security issues related to e-Learning systems. Moreover, this article sets out to showcase some best practice examples concerning cyber security management techniques in e-Learning, addressing the important aspect of BYOD and cyber security tendencies in this domain. - Some of the metrics are blocked by yourconsent settings
Publication Quality in use measures for an AAL system for older adults(IEEE, 2020)Ambient Assisted Living (AAL) aims to improve the quality of life (QoL) of people by assisting them in daily activities through the use of information technology. The quality of AAL systems can be evaluated by measuring quality in use attributes (when the product is in real or simulated use). In doing so, appropriate quality characteristics have to be defined taking into consideration the intended use of the systems. Thus, the importance of specifying and evaluating the relevant quality characteristic using validated and widely accepted measures. This paper focused on presenting a set of specific quality measures adapted to evaluate the quality in use of an AAL platform that monitors and supports older adults.
