We describe an abstract machine, called GCPAN, for the distributed execution of Safe Ambients (SA), a variant of the Ambient Calculus (AC). Our machine improves over previous proposals for executing AC, or variants of...
详细信息
We explore the notion of the workflow for specifying interactions among collections of devices (which we term device ecologies). We discuss three levels of abstraction in programming device ecologies: high-level workf...
详细信息
ISBN:
(纸本)9728865198
We explore the notion of the workflow for specifying interactions among collections of devices (which we term device ecologies). We discuss three levels of abstraction in programming device ecologies: high-level workflow, low-level workflow and device conversations, and how control (in the sense of operations issued by an end-user on such workflows or exceptions) is passed between levels. Such levels of abstraction are important since the system should be as user friendly as possible while permitting programmability not only at high-levels of abstraction but also at low levels of detail. We also present a conceptual architecture for the device ecology workflow engine for executing and managing such workflows.
this paper describes the use of a mixture of abduction and induction for the temporal modelling of the effects of toxins in metabolic networks. Background knowledge is used which describes network topology and functio...
详细信息
ISBN:
(纸本)0769524958
this paper describes the use of a mixture of abduction and induction for the temporal modelling of the effects of toxins in metabolic networks. Background knowledge is used which describes network topology and functional classes of enzymes. this background knowledge, which represents the present state of understanding, is incomplete. In order to overcome this incompleteness hypotheses are considered which consist of a mixture of specific inhibitions of enzymes (ground facts) together with general (non-ground) rules which predict classes of enzymes likely to be inhibited by the toxin. the foreground examples were derived from in vivo experiments involving NMR analysis of time-varying metabolite concentrations in rat urine following injections of toxin. Hypotheses about inhibition are built using the Inductive Logic programming system Progol5.0 and predictive accuracy is assessed for boththe ground and the non-ground cases.
YBa2Cu3O7-d(YBCO) films with highly biaxial textures were deposited on SrTiO3 single crystal, textured polycrystalline Ag and NiO/Ni substrates using pulsed laser deposition, metal-organic decomposition and ultrasonic...
详细信息
ISBN:
(纸本)0878499695
YBa2Cu3O7-d(YBCO) films with highly biaxial textures were deposited on SrTiO3 single crystal, textured polycrystalline Ag and NiO/Ni substrates using pulsed laser deposition, metal-organic decomposition and ultrasonic spray pyrolysis method. the microstrains in different specimens with strong textures were measured using x-ray difiractometer and were compared each other.
Scalable coordination is a key challenge in deployment of multi-agent systems. Resource usage is one part of agent behavior which naturally lends itself to abstraction. CyberOrgs is a model for hierarchical coordinati...
详细信息
Scalable coordination is a key challenge in deployment of multi-agent systems. Resource usage is one part of agent behavior which naturally lends itself to abstraction. CyberOrgs is a model for hierarchical coordination of resource usage by multi-agent applications in a network of peer-owned resources. programming constructs based on the CyberOrgs model allow resource trade and reiflcation of control while maintaining a separation between functional and resource concerns of applications. A prototype implementation of CyberOrgs is described and expressive power of the programming constructs is illustrated with examples. Hierarchical control presents challenges in scalability. However, CyberOrgs make some types of resource coordination more amenable to efficient implementation. Hierarchical scheduling for processor time, for instance, can be implemented scalably by efficiently converting the hierarchical schedule into a flat schedule on the fly. this mechanism can be generalized to achieve scalable coordination of some other resource types. Experimental results are presented which demonstrate scalability of this approach. Copyright 2005 ACM.
the proceedings contain 40 papers. the topics discussed include: an evenhanded certified Email system for contract signing;cryptanalysis of a forward secure blind signature scheme with provable security;on delegatabil...
详细信息
ISBN:
(纸本)3540309349
the proceedings contain 40 papers. the topics discussed include: an evenhanded certified Email system for contract signing;cryptanalysis of a forward secure blind signature scheme with provable security;on delegatability of four designated verifier signatures;private itemset support counting;visual cryptographic protocols using the trusted initializer;cryptanalysis of PASS II and MiniPass;asymmetric concurrent signatures;session table architecture for defending SYN flood attack;port scan behavior diagnosis by clustering;secure multicast using proxy encryption;security properties of two authenticated conference key agreement protocols;enforce mandatory access control policy on XML documents;network access control for mobile ad-hoc networks;authenticating query results in data publishing;and batching SSL/TLS handshake improved.
暂无评论