We introduce a new approach to multivariate polynomial factorisation which incorporates ideas from polyhedral geometry, and generalises Hensel lifting. Our main contribution is to present an algorithm for factoring bi...
详细信息
We introduce a new approach to multivariate polynomial factorisation which incorporates ideas from polyhedral geometry, and generalises Hensel lifting. Our main contribution is to present an algorithm for factoring bivariate polynomials which is able to exploit to some extent the sparsity of polynomials. We give details of an implementation which we used to factor randomly chosen sparse and composite polynomials of high degree over the binary field. Copyright 2004acm.
The understanding of Semantic Web documents is built upon ontologies that define concepts and relationships of data. Hence, the correctness of ontologies is vital. Ontology reasoners such as RACER and FaCT have been d...
详细信息
ISBN:
(纸本)158113844X
The understanding of Semantic Web documents is built upon ontologies that define concepts and relationships of data. Hence, the correctness of ontologies is vital. Ontology reasoners such as RACER and FaCT have been developed to reason ontologies with a high degree of automation. However, complex ontology-related properties may not be expressible within the current web ontology languages, consequently they may not be checkable by RACER and FaCT. We propose to use the software engineering techniques and tools, i.e., Z/EVES and Alloy Analyzer, to complement the ontology tools for checking Semantic Web documents. In this approach, Z/EVES is first applied to remove trivial syntax and type errors of the ontologies. Next, RACER is used to identify any ontological inconsistencies, whose origins can be traced by Alloy Analyzer. Finally Z/EVES is used again to express complex ontology-related properties and reveal errors beyond the modeling capabilities of the current web ontology languages. We have successfully applied this approach to checking a set of military plan ontologies.
The paper describes a soft computing agent approach to remote learning, which is applied to disabled people suffering from dyslexia. Dyslexia is defined as learning disability by four psychologically obtained factors ...
详细信息
ISBN:
(纸本)0780382781
The paper describes a soft computing agent approach to remote learning, which is applied to disabled people suffering from dyslexia. Dyslexia is defined as learning disability by four psychologically obtained factors that present grade of learning deficiency. They are preliminary provided for better understanding and formalization of remote learning process applied to disable people. The paper discusses selection of appropriate groups for definition of individual remote learning purposes. Soft computing agents are used to perform two tasks: optimal partitioning of distributed data bases in accordance with a grade of disability, and coordination in distributed environment for remote group definition. The first task is realized via two-hierarchical fuzzy system for optimization of dyslectic parameters. The second is achieved by means of mobile intelligent agents for transmission, coordination, activation, and receiving decisions from/to remote learning nodes. As a final decision the node soliciting optimal group choice obtains information for the group distribution over the whole system.
A meta-analysis is performed on the last twenty years of SIGCSE Technical symposiumproceedings, looking for the kind of CS Educational Research that has been done at the CS1/CS2 level. A six-point taxonomy of article...
详细信息
ISBN:
(纸本)1581137982
A meta-analysis is performed on the last twenty years of SIGCSE Technical symposiumproceedings, looking for the kind of CS Educational Research that has been done at the CS1/CS2 level. A six-point taxonomy of articles types is described. It is shown that about one in five of all CS1/CS2 presentations have used some kind of experimental model, albeit "experimental" is defined quite broadly. Over the last ten years both the number of experimental models, and the percentage of experimental models among CS1/CS2 has significantly increased. SIGCSE members are challenged to adopt a research model for their presentations to the Technical symposium.
The proceedings contains 31 papers from the conference on 31st Annual International symposium on Computer Architecture ISCA 2004. The topics discussed include: evaluating the imagine stream architecture;the vector-thr...
详细信息
The proceedings contains 31 papers from the conference on 31st Annual International symposium on Computer Architecture ISCA 2004. The topics discussed include: evaluating the imagine stream architecture;the vector-thread architecture;transactional memory coherence and consistency;power awareness through selective dynamically optimized traces;adaptive cache compression for high-performance processors;physical register inlining;use-based register caching with decoupled indexing;a first-order superscalar processor model;and control flow modeling in statistical simulation for accurate and efficient processor design studies.
The proceedings contains 50 papers from the conference on Third International symposium on Information Processing in Sensor Networks: IPSN 2004. The topics discussed include: locally constructed algorithms for distrib...
详细信息
ISBN:
(纸本)1581138466
The proceedings contains 50 papers from the conference on Third International symposium on Information Processing in Sensor Networks: IPSN 2004. The topics discussed include: locally constructed algorithms for distributed computations in ad-hoc networks;distributed online localization in sensor networks using a moving target;fusion in sensor networks with communication constraints;a proababilistic approach to interence with limited information in sensor networks;virtual radar imaging for sensor networks and adaptive clock synchronization in sensor networks.
Over the coming years, many are anticipating grid computing infrastructure, utilities and services to become an integral part of future socio-economical fabric. However, factors such as;cost of access, reliability and...
详细信息
ISBN:
(纸本)0769522254
Over the coming years, many are anticipating grid computing infrastructure, utilities and services to become an integral part of future socio-economical fabric. However, factors such as;cost of access, reliability and dependability of the technology will undoubtedly influence its adoption and widespread. Though, IBM between the many are promoting autonomic computing as a solution to alleviate such concerns by delegating software systems' own management, security, reliability and performance tuning to the software itself. Based on an on-going research work, focusing on high-assurance concerns of widely distributed systems, this paper will outline a service-oriented approach and associated service infrastructure description languages, which are used to facilitate the construction and management of ad-hoc federated software services.
In run-time safety analysis the executions of a concurrent program are monitored and analyzed with respect to safety properties. Similar to testing, run-time analysis is quite efficient, but it also tends to be incomp...
详细信息
In run-time safety analysis the executions of a concurrent program are monitored and analyzed with respect to safety properties. Similar to testing, run-time analysis is quite efficient, but it also tends to be incomplete. The results pertain only to the observed executions which may constitute just a small subset of all possible executions. In this paper, we describe a tool called ViP which uses the software model checker VeriSoft to perform comprehensive run-time safety analyses of concurrent C/C++ programs. A ViP analysis proceeds in three fully automated steps: First, the input program is prepared for a VeriSoft analysis through instrumentation. Next, VeriSoft is invoked to generate the traces corresponding to all possible executions of the program. Then, the traces are checked efficiently for specification violations. The instrumentation is based on the source code transformation language TXL. TXL allows for the instrumentation to be described in terms of rewrite rules and gives ViP a remarkable amount of flexibility. The paper describes ViP together with its use of VeriSoft and TXL. Several sample analyses are discussed to illustrate the use of ViP. Copyright 2004acm.
The support of surgical interventions has long been in the focus of application-oriented augmented reality research. Modern methods of surgery, like minimally-invasive procedures, can benefit from the additional infor...
详细信息
ISBN:
(纸本)9781581139075
The support of surgical interventions has long been in the focus of application-oriented augmented reality research. Modern methods of surgery, like minimally-invasive procedures, can benefit from the additional information visualization provided by augmented reality. The usability of medical augmented reality depends on a rendering scheme for virtual objects designed to generate easily and quickly understandable augmented views. One important factor for providing such an accessible reality augmentation is the correct handling of the occlusion of virtual objects by real scene elements. The usually large volumetric datasets used in medicine are ill-suited for use as phantom models for static occlusion handling. We present a simple and fast preprocessing pipeline for medical volume datasets which extracts their visual hull volume. The resulting, significantly simplified visual hull iso-surface is used for real-time static occlusion handling in our AR system, which is based on off-the-shelf medical equipment. Copyright 2004acm.
Multiplayer online 3D games are becoming very popular in recent years. However, existing games require the complete game content to be installed prior to game playing. Since the content is usually large in size, it ma...
详细信息
Multiplayer online 3D games are becoming very popular in recent years. However, existing games require the complete game content to be installed prior to game playing. Since the content is usually large in size, it may be difficult to run these games on a PDA or other hand-held devices. It also pushes game companies to distribute their games as CDROMs/DVDROMs rather than online downloading. On the other hand, due to network latency, players may perceive discrepant status of some dynamic game objects. In this paper, we present a game-on-demand (GameOD) framework to distribute game content progressively in an on-demand manner. It allows critical contents to be available at the players' machines in a timely fashion. We present a simple distributed synchronization method to allow concurrent players to synchronize their perceived game status. Finally, we show some performance results of the proposed framework. Copyright 2004acm.
暂无评论