The proceedings contains 205 papers. Topics discussed include computational logic, agents, interactions, mobility and systems, applications of spatial simulation of discrete entities, bioinformatics, computational sci...
详细信息
The proceedings contains 205 papers. Topics discussed include computational logic, agents, interactions, mobility and systems, applications of spatial simulation of discrete entities, bioinformatics, computational science, computer security, coordination models, languages and applications, database and digital technologies, declarative data mining, electronic books for technical learning, evolutionary computing and optimization, information access and retrieval, inter disciplinary approaches to the design of dependable computer systems, multimedia and visualization, neuro-fuzzy applications, parallel and distributed systems and networking, programming language and object technologies, software engineering, standardization in information technology, virtual reality, digital media and computer games, web and electronic business applications.
Compiler based analysis helps in reducing the anglet migration overheads and improves performance. Two strategies, TOND and TALD, are presented. Both reduce the overheads for large data sizes and small data sizes resp...
详细信息
Compiler based analysis helps in reducing the anglet migration overheads and improves performance. Two strategies, TOND and TALD, are presented. Both reduce the overheads for large data sizes and small data sizes respectively trading the number of migrations vs. the amount of data carried during a migration. It is shown that in general, compiler generated schedules coupled with the use of these policies result in an efficient aglet code.
A new analytical model for predicting message delay in wormhole-routed torus is presented. Unlike previous wormhole routing models, which mainly have been developed for uniform traffic, the model introduced in this pa...
详细信息
A new analytical model for predicting message delay in wormhole-routed torus is presented. Unlike previous wormhole routing models, which mainly have been developed for uniform traffic, the model introduced in this paper computes message latency in the wormhole-routed torus in the presence of broadcast traffic. Results obtained through simulation experiments show that the model exhibits a good degree of accuracy in predicting message latency under different working conditions.
We propose two variations of a new image abstraction technique based on signature bit-strings as well as an appropriate similarity metric for color-based image retrieval. Performance evaluation on a heterogeneous data...
详细信息
ISBN:
(纸本)9781581134452
We propose two variations of a new image abstraction technique based on signature bit-strings as well as an appropriate similarity metric for color-based image retrieval. Performance evaluation on a heterogeneous database of 20,000 images demonstrated that the proposed technique outperforms well-known approaches while still saving substantial amount of storage space, making it possible to store/search an image database of reasonable size using a few megabytes of main memory (e.g., 4 Mbytes for 100,000 images).
Many fully-adaptive algorithms have been proposed for k-ary n-cubes over the past decade. The performance characteristics of most of these algorithms have been analysed by means of software simulation only. This paper...
详细信息
ISBN:
(纸本)9781581134452
Many fully-adaptive algorithms have been proposed for k-ary n-cubes over the past decade. The performance characteristics of most of these algorithms have been analysed by means of software simulation only. This paper proposes a simple yet reasonably accurate analytical model to predict message latency in wormhole-routed k-ary n-cubes with fully adaptive routing. This model requires a running time of O(1) which is the fastest model yet reported in the literature while maintaining reasonable accuracy.
Context free grammars present the desirable cryptographic property that it is easy to generate and validate strings from a given grammar, however it is hard to identify a grammar given only the strings generated by it...
详细信息
ISBN:
(纸本)9781581134452
Context free grammars present the desirable cryptographic property that it is easy to generate and validate strings from a given grammar, however it is hard to identify a grammar given only the strings generated by it. The algorithm used in the authentication protocol proposed in this paper makes use of context free grammars. This authentication protocol is a perfect candidate for the offline generation and validation of a disposable credit card number. The proposed protocol can be used alone and it does not rely on any other cryptographic protocols like SSL for its security. This paper presents and analyses the protocol with respect to its robustness against malicious attacks.
As biomedical researchers are amassing a plethora of information in a variety of forms resulting from the advancements in biomedical research, there is a critical need for innovative information management and knowled...
详细信息
As biomedical researchers are amassing a plethora of information in a variety of forms resulting from the advancements in biomedical research, there is a critical need for innovative information management and knowledge discovery tools to sift through these vast volumes of heterogeneous data and analysis tools. In this paper we present a general model for an information management system that is adaptable and scalable, followed by a detailed design and implementation of one component of the model. The prototype, called BioSifter, was applied to problems in the bioinformatics area. The results indicate that BioSifter is a powerful tool for biological researchers to automatically retrieve relevant text documents from biological literature based on their interest profile. The paper also presents experimental studies with real users to illustrate the efficacy of the approach.
Two independent sets of recent observations on newly sequenced microbial genomes pertain to the prevalence of short inversion as a gene order rearrangement process and to the lack of conservation of gene order within ...
详细信息
Two independent sets of recent observations on newly sequenced microbial genomes pertain to the prevalence of short inversion as a gene order rearrangement process and to the lack of conservation of gene order within conserved gene clusters. We propose a model of inversion where the key parameter is the length of the inverted fragment. We show that there is a qualitative difference in the pattern of evolution when the inversion length is small with respect to the cluster size and when it is large. This suggests an explanation of the lack of parallel gene order in conserved clusters and raises questions about the statistical validity of putative functionally selected gene clusters if these have only been tested against inappropriate null hypothesis.
Security problems in collaboration work are less well understood than those in the business and defence worlds. Earlier work in the medical area in Britain has highlighted some of the principles involved but has negle...
详细信息
ISBN:
(纸本)9781581134452
Security problems in collaboration work are less well understood than those in the business and defence worlds. Earlier work in the medical area in Britain has highlighted some of the principles involved but has neglected some important areas. Most of the security models developed to date are inadequate in the collaboration area. We develop a perspective for policies and models that is task-based on a need-to-know basis. These policies can be represented as Petri nets to identify the functions and states involved. We have also developed a general architecture for a secure collaborative environment. An example is given of the application of our techniques to a problem involving negatiation, decision and agreement in a collaboration environment.
Interactive storytelling can either be based on explicit plot representations or on the autonomous behaviour of artificial characters. In such a character-based approach, the dynamic interaction between characters gen...
详细信息
Interactive storytelling can either be based on explicit plot representations or on the autonomous behaviour of artificial characters. In such a character-based approach, the dynamic interaction between characters generates the actual plot from a generic storyline. Characters' behaviours are implemented through real-time search-based planning techniques. However, the top-down planning systems that control artificial actors need to be complemented with appropriate mechanisms dealing with emerging ("bottom-up") situations of narrative relevance. After discussing the determinants of plot variability and the mechanisms that account for the emergence of narrative situations, we introduce additional mechanisms for coping with these situations. These comprise situated reasoning and action repair: we most specifically illustrate the latter through a detailed example.
暂无评论