In this paper we introduce Semantic Web Spaces, a middleware for coordinating knowledge processes on the Semantic Web. Co-ordination is an important aspect of any type of interaction between computer agents, but we fi...
详细信息
ISBN:
(纸本)1595934804;9781595934802
In this paper we introduce Semantic Web Spaces, a middleware for coordinating knowledge processes on the Semantic Web. Co-ordination is an important aspect of any type of interaction between computer agents, but we find especially so on the Semantic Web in which the communication contains knowledge rather than data and correct inferences can only be made when the right knowledge is available at the right time. Because of this we have identified tuplespace computing as a relevant paradigm for agent communication on the Semantic Web and have prototypically realized a system based on a Linda-inspired coordination model and on core semantic technologies such as RDF, ontologies and reasoning. Copyright 2007 acm.
Data that can conceptually be viewed as tree structures abounds in domains such as bio-informatics, web logs, XML databases and multi-relational databases. Besides structural information such as nodes and edges, tree ...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Data that can conceptually be viewed as tree structures abounds in domains such as bio-informatics, web logs, XML databases and multi-relational databases. Besides structural information such as nodes and edges, tree structured data also often contains attributes, that represent properties of nodes. Current algorithms for finding frequent patterns in structured data, do not take these attributes into account, and hence potentially useful information is neglected. We present FAT-miner, an algorithm for frequent pattern discovery in tree structured data with attributes. To illustrate the applicability of FAT-miner, we use it to explore the properties of good and bad loans in a well-known multi-relational financial database. Copyright 2007 acm.
Access control in mobile and pervasive computing is a complex issue, with many aspects relating to the establishment, management, and enforcement of methods and policies that allow mobile devices to share resources wi...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Access control in mobile and pervasive computing is a complex issue, with many aspects relating to the establishment, management, and enforcement of methods and policies that allow mobile devices to share resources with each other. Communication between mobile devices can arise spontaneously, involve the sharing of few resources between heterogeneous platforms, and only need to be maintained for a short time. Additionally, the devices often communicate with each other a single time, and have no pre-shared secret or a priori knowledge of the other device. In this paper we propose a secure solution for providing controlled access to local resources in mobile and pervasive computing environments. Our solution incorporates demonstrative verification of security credentials, a key-based capability delegation, and easy to use access control features in order to provide simple access with low maintenance costs. It is particularly designed for one-time-only communication between mobile-to-mobile or mobile-to-kiosk devices. Copyright 2007 acm.
This paper introduces an infrastructure for engineering environments for multi-agent systems. Such an infrastructure is based on a component model specification, named CMS, which promotes dynamic unanticipated evoluti...
详细信息
ISBN:
(纸本)1595934804;9781595934802
This paper introduces an infrastructure for engineering environments for multi-agent systems. Such an infrastructure is based on a component model specification, named CMS, which promotes dynamic unanticipated evolution of software. We propose an Agent Model Specification (AMS), focusing on environment engineering issues. Moreover, we present a Java framework that implements AMS and a case study to exemplify the application of our approach. Copyright 2007 acm.
In this paper an automatic and effective method was proposed for mass segmentation in mammography. Based on the facts that mass edges are continuous and closed curves consisted of points which have larger gradient tra...
详细信息
ISBN:
(纸本)1595934804;9781595934802
In this paper an automatic and effective method was proposed for mass segmentation in mammography. Based on the facts that mass edges are continuous and closed curves consisted of points which have larger gradient transformation, a plane fitting method and a dynamic programming technique were applied. The regions of interest (ROIs) used in this study were extracted from DDSM. The preliminary experimental results show that the segmentation algorithm performs well for various types of masses. Copyright 2007 acm.
Designing open and distributed systems that can dynamically adapt in a predictable way to unexpected events is a challenging issue still not solved. Achieving this objective is a very complex task since it implies rea...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Designing open and distributed systems that can dynamically adapt in a predictable way to unexpected events is a challenging issue still not solved. Achieving this objective is a very complex task since it implies reasoning at run-time, explicitly and in a combined way, on a system's functional and non-functional characteristics. This paper proposes a service-oriented architectural model allowing the dynamic enforcement of formally expressed metadata-based resilience policies. It also describes preliminary dynamic resilience experiments acting as proof of concept. Copyright 2007 acm.
Runtime monitoring is performed during system execution to detect whether the system's behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Runtime monitoring is performed during system execution to detect whether the system's behaviour deviates from that described by requirements. To support this activity we have developed a monitoring framework that expresses the requirements to be monitored in event calculus - a formal temporal first order language. Following an investigation of how this framework could be used to monitor security requirements, in this paper we propose patterns for expressing three basic types of such requirements, namely confidentiality, integrity and availability. These patterns aim to ease the task of specifying confidentiality, integrity and availability requirements in monitorable forms by non-expert users. The paper illustrates the use of these patterns using examples of an industrial case study. Copyright 2007 acm.
In this paper, we presented a method to improve structural modeling based on conserved domain clusters and structure-anchored alignments. We first constructed a template library of structural clusters for all conserve...
详细信息
ISBN:
(纸本)1595934804;9781595934802
In this paper, we presented a method to improve structural modeling based on conserved domain clusters and structure-anchored alignments. We first constructed a template library of structural clusters for all conserved sequence domains. Then, for each cluster, we built the profile using the structure and sequence information. Finally we use the profile and structural alignments as anchors to increase the alignment accuracy between a query and its templates. Our preliminary results show that this method can be used for the partial prediction for a majority of known protein sequences with better qualities. Copyright 2007 acm.
In distributed, service-oriented environments, performance problem localization is required to provide self-healing capabilities and deliver the desired quality of service (QoS). This paper presents an automated appro...
详细信息
ISBN:
(纸本)1595934804;9781595934802
In distributed, service-oriented environments, performance problem localization is required to provide self-healing capabilities and deliver the desired quality of service (QoS). This paper presents an automated approach to identifying system elements causing performance problems. Applying probabilistic inference to collected response time and elapsed time data, the approach 1) infers elapsed time for services where data is missing, 2) estimates the response time degradation caused by different services using the duration, abnormality and response time correlation of their elapsed times, and 3) identifies the services that are the most important causes of slow response time and yield the most benefit if recovered. The approach has been used to localize a performance problem on the test bed of a real-world service-oriented Grid. Evaluation using simulations shows that the approach consistently achieves better accuracy than traditional techniques in various service-oriented settings. Copyright 2007 acm.
Due to the preeminent work of the real-time specification for Java(RTSJ), Java is increasingly expected to become the leading programming language in real-time systems. To provide a Java platform suitable for real-tim...
详细信息
ISBN:
(纸本)1595934804;9781595934802
Due to the preeminent work of the real-time specification for Java(RTSJ), Java is increasingly expected to become the leading programming language in real-time systems. To provide a Java platform suitable for real-time applications, a real-time Java processor can execute Java bytecode directly is proposed in this paper. This processor provides efficient support in hardware for mechanisms specified in the RTSJ and offers a simpler programming model through ameliorating the scoped memory of the RTSJ. The most important characteristic of the processor is that its WCET(worst case execution time) of the bytecode execution is predictable. It is vital for the real-time systems. Copyright 2007 acm.
暂无评论