Applications deployed in mobile peer-to-peer systems have to cope with mobility and fluctuation of nodes. these dynamics restrict the reliability of communication links as well as the availability of certain nodes, se...
详细信息
Applications deployed in mobile peer-to-peer systems have to cope with mobility and fluctuation of nodes. these dynamics restrict the reliability of communication links as well as the availability of certain nodes, services, and resources. Exploring the context of nodes can be used to anticipate these shortages. context-awareness enables improvement of performance of systems and enables adaptation of applications in order to make their behavior more relevant with respect to their current situation. Preevaluation of context can be used to estimate future availability of crucial resources and reliability of communication links. Which information is considered to be relevant context information varies according to the application scenario. In this paper, we present a model for context information along with a mobile service that provides a local view of surrounding nodes in a Mobile Ad-hoc NETwork (MANET). the service is designed to enable efficient prediction of future stability of the vicinity of a node.
In recent years, there has been a growing interest in the development and use of domain ontologies, strongly motivated by the semantic Web initiative. However, as we demonstrate in this paper, an approach for ontology...
详细信息
In recent years, there has been a growing interest in the development and use of domain ontologies, strongly motivated by the semantic Web initiative. However, as we demonstrate in this paper, an approach for ontology representation uniquely based on the modeling languages adopted in the semantic Web is insufficient to address a number of semantic interoperability problems that arise in concrete application scenarios. the main objective of this paper is to advocate in favor of an approach for conceptual modeling, in general, and domain ontology representation, in particular, in which lightweight modeling languages such as OWL and standard UML are complemented by modeling languages and methodologies based on theoretically principled foundational ontologies
Fragmentation, allocation and replication are database distribution design techniques that aim at improving the system performance. Among the two fragmentation techniques, vertical fragmentation is often considered mo...
详细信息
Fragmentation, allocation and replication are database distribution design techniques that aim at improving the system performance. Among the two fragmentation techniques, vertical fragmentation is often considered more complicated than horizontal fragmentation, because the huge number of alternatives makes it nearly impossible to obtain an optimal solution to the vertical fragmentation problem. therefore, we can only expect to find out a heuristic solution. Often fragmentation and allocation are considered separately, disregarding that they are usingthe same input information to achieve the same objective, i.e. improve the overall system performance. this paper addresses vertical fragmentation and allocation simultaneously in the context of the relational model. the core of the paper is a heuristic approach to vertical fragmentation, which uses a cost model and is targeted at globally minimising these costs
We took an innovative approach to service level management for network enterprise systems by using integrated monitoring, diagnostics, and adaptation services in a service-oriented architecture. the autonomous diagnos...
详细信息
We took an innovative approach to service level management for network enterprise systems by using integrated monitoring, diagnostics, and adaptation services in a service-oriented architecture. the autonomous diagnosis for trouble-shooting of web service interruptions is based on Bayesian network models. In this paper, we present our methods for building the diagnostic models. We focus on two types of Bayesian network models of different structure complexity. Our result shows that the two-layer model outperforms the three-layer model in the applied domain. this challenges the common belief that adding unnecessary nodes in a Bayesian network and growing its structural complexity does not deteriorate performance. Hence such practice of building more complex models than necessary should be approached cautiously within the context of the applied domain.
In this paper, we present a rule-based approach supporting the automatic adaptation in Web Information Systems. the approach relies on the general notions of profile and configuration. Special rules are used to specif...
详细信息
In this paper, we present a rule-based approach supporting the automatic adaptation in Web Information Systems. the approach relies on the general notions of profile and configuration. Special rules are used to specify, in a declarative way, how to build a configuration that satisfies the requirements of adaptation for a profile. the rule evaluation technique guarantees that different contexts and orthogonal requirements of adaptation, possibly not fixed in advance, can be taken into account in the adaptation process.
Due to the ever-increasing importance of computers in many areas of today's society such as e-learning, telehome-health care, and entertainment, their ability to interact well with humans is essential. Currently, ...
详细信息
Due to the ever-increasing importance of computers in many areas of today's society such as e-learning, telehome-health care, and entertainment, their ability to interact well with humans is essential. Currently, researchers are using facial expression and voice recognition modalities to create systems that interact with humans. But still two problems exist: gesture is not yet a concern as a channel of affective communication in interactive technology, and existing systems only model discrete categories but not affective dimensions, e.g., intensity. Our focus has been on creating affective gesture recognition system that recognize child's emotion with intensity through body gestures in context of game. this information is then used by a game control module that users a rule-based adaptation model to change game level according to the child's intensity of emotions. Results show that affective gesture recognition model recognized child's emotion over 79% of the cases and the proposed intensity estimate model has a strong relationship with observer perception except in the low intensity level
Independent, heterogeneous, distributed, sometimes transient and mobile data sources produce an enormous amount of information that should be semantically integrated and filtered, or, as we say, tailored, based on the...
详细信息
ISBN:
(纸本)9780769525266
Independent, heterogeneous, distributed, sometimes transient and mobile data sources produce an enormous amount of information that should be semantically integrated and filtered, or, as we say, tailored, based on the user’s interests and context. Since boththe user and the data sources can be mobile, and the communication might be unreliable, caching the information on the user device may become really useful. therefore new challenges have to be faced such as: data filtering in a context-aware fashion, integration of not-known-in-advance data sources, automatic extraction of the semantics. We propose a novel system named context-ADDICT (context-Aware Data Design, Integration, Customization and Tailoring) able to deal withthe described scenario. the system we are designing aims at tailoring the available information to the needs of the current user in the current context, in order to offer a more manageable amount of information; such information is to be cached on the user’s device according to policies defined at design-time, to cope with data source transiency. this paper focuses on the information representation and tailoring problem and on the definition of the global architecture of the system.
Assessing risk from potential geologic repositories for high-level radioactive waste (HLW) poses a unique challenge because of the large temporal and spatial scales involved. the repository systems typically involve m...
详细信息
ISBN:
(纸本)0791802442
Assessing risk from potential geologic repositories for high-level radioactive waste (HLW) poses a unique challenge because of the large temporal and spatial scales involved. the repository systems typically involve multiple engineered barriers and emplacement in a remote geologic location. It is not feasible to conduct experiments on the scale of a repository system. As a result, scientists rely on inference from shorter-term, controlled laboratory and field experiments, as well as historical data from natural analogs to model the system. this leads to uncertainties in modelingthe risk from the repository. the importance of these uncertainties depends on the context for conducting and usingthe risk assessments. the U.S. National Research Council has pointed out that the proper role of risk assessments is to inform societal decisions and facilitate deliberation among stakeholders. In the case of HLW repositories, the most important sources of risk information for these decisions are the results of integrated repository system modeling compiled in performance assessments (PA). these PAs inform critical decisions for national HLW repository programs. the important uncertainties in the PA are those to which decisions may be sensitive. To build confidence given potentially important uncertainties, a typical safety case for a proposed HLW repository is comprised of PA results coupled with various defense-in-depth elements, such as the multiple-barrier requirement for repository design, and insights from supplementary analyses. this paper proposes an additional supplementary analysis, the Strategic Partitioning of Assumption-Ranges and Consequences (SPARC), whose goal is to construct a specific explanation of the PA results of interest, to aid risk-informed decision-making and riskinformed stakeholder deliberation. the method seeks to provide explanations for undesired system behavior that are similar to those provided by a reactor probabilistic safety assessment (PSA);
the proceedings contain 10 papers. the topics discussed include: a learning interaction memory usingcontextual information;towards the narrative approach to collect group knowledge and context;AulaNetM: extension of ...
the proceedings contain 10 papers. the topics discussed include: a learning interaction memory usingcontextual information;towards the narrative approach to collect group knowledge and context;AulaNetM: extension of the AulaNet environment to PDAs;context in collaborative mobile scenarios;the decision hedgehog - enhancing contextual knowledge for group decision authoring and communication support;contextual support for remote cooperative troubleshooting: lessons from a naturalistic study*;placing newly-arising goals in the proper context*;first steps in contextmodeling for conflicts characterization in cooperative task-execution support systems;towards rich context virtual worlds;and enhancing collaboration services with business context models.
the use and application of concepts such as 'convergence' and 'divergence' are general and vague and often demonstrate internal inconsistencies. Despite this fact, or rather because of it, this paper w...
详细信息
the use and application of concepts such as 'convergence' and 'divergence' are general and vague and often demonstrate internal inconsistencies. Despite this fact, or rather because of it, this paper will take the convergence/divergence dichotomy as a starting point in order to present a model for the understanding of the dynamics in the relationship between convergence and divergence in educational media. this model of convergence and divergence will then aim to show how educational genres relate to and are constrained by technology, production and use in various social, cultural and historical settings. the model is simple and flexible and will be applied to demonstrate how genre convergence and divergence takes place in different educational contexts: past, present and future.
暂无评论