Issue 3 • May 2010
Table of contentsPublication Year: 2010, Page(s): C1| PDF (36 KB)
IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews publication informationPublication Year: 2010, Page(s): C2| PDF (37 KB)
Cited by: Papers (31)
Since Grid computing systems involve large-scale resource sharing, resource management is central to their operations. Whereas there are more Grid resource management systems adopting auction, commodity market, and contract-net (tendering) models, this survey supplements and complements existing surveys by reviewing, comparing, and highlighting existing research initiatives on applying bargaining ... View full abstract»
Cited by: Papers (6)
Modeling and detecting bursts in data streams is an important area of research with a wide range of applications. In this paper, we present a novel method to analyze and identify correlated burst patterns by considering multiple data streams that coevolve over time. The main technical contribution of our research is the use of a dynamic probabilistic network to model the dependency structures obse... View full abstract»
Cited by: Papers (3)
The problem of computing a schedule of maximum robustness for the Mars Express mission is formulated and solved via linear programming (LP). We also provide a characterization of ¿¿easy¿¿ and ¿¿difficult¿¿ instances such that the former ones can be solved to optimality directly, without having recourse to any optimization algorithm. In both cases, provably optimal solutions are obtained in shorter... View full abstract»
Cited by: Papers (78)
Feature-based image watermarking schemes, which aim to survive various geometric distortions, have attracted great attention in recent years. Existing schemes have shown robustness against rotation, scaling, and translation, but few are resistant to cropping, nonisotropic scaling, random bending attacks (RBAs), and affine transformations. Seo and Yoo present a geometrically invariant image waterma... View full abstract»
Cited by: Papers (17)
Constructing a single text classifier that excels in any given application is a rather inviable goal. As a result, ensemble systems are becoming an important resource, since they permit the use of simpler classifiers and the integration of different knowledge in the learning process. However, many text-classification ensemble approaches have an extremely high computational burden, which poses limi... View full abstract»
Cited by: Papers (30) | Patents (1)
Malware is software designed to infiltrate or damage a computer system without the owner's informed consent (e.g., viruses, backdoors, spyware, trojans, and worms). Nowadays, numerous attacks made by the malware pose a major security threat to computer users. Unfortunately, along with the development of the malware writing techniques, the number of file samples that need to be analyzed, named "gra... View full abstract»
Cited by: Papers (17)
In this paper, the effects of network delay among interconnecting elements of a distributed computer network control system are analyzed. Experimental tests have been accomplished to show the influence of the combined effects of the network delay (between sensor/controller and controller/actuator) on the overall performance of a feedback control system. For this purpose, a proportional-plus-integr... View full abstract»
Cited by: Papers (4)
As electronic records (e.g., medical records and technical defect records) accumulate, the retrieval of a record from a past instance with the same or similar circumstances, has become extremely valuable. This is because a past record may contain the correct diagnosis or correct solution to the current circumstance. We refer to the two records of the same or similar circumstances as master ... View full abstract»
Synthesis of Structurally Simple Supervisors Enforcing Generalized Mutual Exclusion Constraints in Petri NetsPublication Year: 2010, Page(s):330 - 340
Cited by: Papers (19) | Patents (1)
Generalized mutual exclusion constraints (GMECs) are a typical class of specifications for the supervisory control of discrete event systems in a Petri net formalism. This paper classifies the given constraints into elementary and dependent ones according to the linear dependency of their characteristic transition vectors that indicate the token count change of the concerned places. The dependent ... View full abstract»
Cited by: Papers (12)
State-of-the-art baggage handling systems transport luggage in an automated way using destination coded vehicles (DCVs). These vehicles transport the bags at high speeds on a network of tracks. Currently, the DCVs are routed through the system using routing schemes based on preferred routes. These routing schemes respond to the occurrence of predefined events. We do not consider such predefined pr... View full abstract»
Cited by: Papers (43)
Equalization refers to any signal processing technique used at the receiver to combat intersymbol interference in dispersive channels. This paper reviews the applications of artificial neural networks (ANNs) in modeling nonlinear phenomenon of channel equalization. The literature associated with different feedforward neural network (NN) based equalizers like multilayer perceptron, functional-link ... View full abstract»
Cited by: Papers (23) | Patents (1)
The classification of wood types is needed in many industrial sectors, since it can provide relevant information concerning the features and characteristics of the final product (appearance, cost, mechanical properties, etc.). This analysis is typical in the furniture industries and the wood panel production. Usually, the analysis is performed by human experts, is not rapid, and has a nonuniform a... View full abstract»
Special issue on semantics-enabled software engineeringPublication Year: 2010, Page(s): 367| PDF (122 KB)
Special issue on engineering applications of memetic computingPublication Year: 2010, Page(s): 368| PDF (177 KB)
IEEE Systems, Man, and Cybernetics Society InformationPublication Year: 2010, Page(s): C3| PDF (29 KB)
IEEE Transactions on Systems, Man, and Cybernetics—Part C: Applications and Reviews Information for authorsPublication Year: 2010, Page(s): C4| PDF (36 KB)
Aims & Scope
Overview, tutorial and application papers concerning all areas of interest to the SMC Society: systems engineering, human factors and human machine systems, and cybernetics and computational intelligence.
Authors should submit human-machine systems papers to the IEEE Transactions on Human-Machine Systems.
Authors should submit systems engineering papers to the IEEE Transactions on Systems, Man and Cybernetics: Systems.
Authors should submit cybernetics papers to the IEEE Transactions on Cybernetics.
Authors should submit social system papers to the IEEE Transactions on Computational Social Systems.
Meet Our Editors
Dr. Vladimir Marik
(until 31 December 2012)