It is well understood that a conflict between functionality and confidentiality exists within the context of medical research databases: while patients' rights must be preserved, restricting access to data can red...
详细信息
ISBN:
(纸本)9781581139648
It is well understood that a conflict between functionality and confidentiality exists within the context of medical research databases: while patients' rights must be preserved, restricting access to data can reduce the value of the data that is available to the researcher. As such, limiting access so that confidentiality is preserved without reducing functionality more than is necessary should be a key aim of every designer of medical research databases. In this paper we investigate the application of query modification for the protection of sensitive patient data with a view to preserving functionality as much as possible. The work has been conducted within the context of the e-DiaMoND research project. Copyright 2005 acm.
We compared the performance of Bayes Theory, Fuzzy Set Theory, Heuristic method and Dempster-Shafer Theory in the identification of aircrafts by using the information from different sensors. From the results of the si...
详细信息
ISBN:
(纸本)9781581139648
We compared the performance of Bayes Theory, Fuzzy Set Theory, Heuristic method and Dempster-Shafer Theory in the identification of aircrafts by using the information from different sensors. From the results of the simulation, the Fuzzy method produces the best result. The final identification could be improved if specific features of each type of aircraft are available. To get more accurate object identification, the results from each method can be combined with the best assignment of values for each method. Copyright 2005 acm.
Next-generation mobile devices will be multi-functional and be expected to execute a broad range of compute-intensive applications. They are constraint by their device and mobility characteristics in achieving these e...
详细信息
ISBN:
(纸本)9781581139648
Next-generation mobile devices will be multi-functional and be expected to execute a broad range of compute-intensive applications. They are constraint by their device and mobility characteristics in achieving these expectations. Reconfigurable logic has vast potential to facilitate mobile devices in meeting these future system performance requirements. This paper proposes incorporating reconfigurable computing and agent technology into mobile device environments. Agent technology is an ideal middleware for mobile device management enabling effective utilization of reconfigurable resources. Reconfigurable logic is integrated into the environment of a mobile device i.e. both into the physical device and into surrounding adaptive servers. An outline of the overall strategy is described. A detailed examination of enabling a client mobile device to dynamically offload reconfigurable hardware-software based computations to neighboring adaptive servers is presented. In addition, the paper details an initial demonstrator system within a medical environment. Copyright 2005 acm.
In this paper we propose an algorithm for estimating the reliability of mobile agent systems, based on the conditions of the underlying computer network. We use the concept of restricted random walks in graph theory f...
详细信息
ISBN:
(纸本)9781581139648
In this paper we propose an algorithm for estimating the reliability of mobile agent systems, based on the conditions of the underlying computer network. We use the concept of restricted random walks in graph theory for generating a random static route strategy for mobile agents. The complexity of the mobile agent networks makes it hard to obtain the reliability of the system theoretically;instead we estimate it using the Monte Carlo approach. We assume that the system consists of a number of independent agents operating simultaneously. The results we have achieved demonstrate the robustness of the proposed algorithm, j Copyright 2005 acm.
Finding the appropriate location of adaptation points for computation migration/checkpointing is critical since the distance between two consecutive adaptation points determines the migration/checkpointing scheme'...
详细信息
ISBN:
(纸本)9781581139648
Finding the appropriate location of adaptation points for computation migration/checkpointing is critical since the distance between two consecutive adaptation points determines the migration/checkpointing scheme's sensitivity and overheads. This paper proposes a heuristic adaptation point placement algorithm to improve the computation migration/checkpointing schemes' performance in terms of sensitivity and flexibility. This heuristic algorithm enables automatic and transparent insertion of checkpoints in user's source code. Copyright 2005 acm.
CSP++ is an object-oriented application framework for execution of CSP specifications that have been automatically translated into C++ source code by a tool called cspt. This approach makes CSP specifications directly...
详细信息
ISBN:
(纸本)9781581139648
CSP++ is an object-oriented application framework for execution of CSP specifications that have been automatically translated into C++ source code by a tool called cspt. This approach makes CSP specifications directly executable, and extensible via the ability to incorporate user-coded functions. Designers can exploit "selective formalism" to code some system functionality in CSP for formal verification purposes, and other functionality directly in C++. The translator has now been enhanced to accept input in CSPm syntax, the same dialect processed by the commercial verification tool, FDR2, and we demonstrate this with a new ATM case study. Copyright 2005 acm.
In this paper, we propose a multi-agent approach for solving a class of optimization problems involving expensive resources, where monolithic local search schemes perform miserably. More specifically, we study the cla...
详细信息
ISBN:
(纸本)9781581139648
In this paper, we propose a multi-agent approach for solving a class of optimization problems involving expensive resources, where monolithic local search schemes perform miserably. More specifically, we study the class of bin-packing problems. Under our proposed Fine-Grained Agent System scheme, rational agents work both collaboratively and selfishly based on local search and mimic physics-motivated systems. We apply our approach to a generalization of bin-packing - the Inventory Routing Problem with Time Windows - which is an important logistics problem, and demonstrate the efficiency and effectiveness of our approach. Copyright 2005 acm.
In this paper, we describe PUMAS [3], a framework based on Ubiquitous Agents for accessing Web Information Systems (WIS) through Mobile Devices (MD). The objective of PUMAS is to adapt the information delivered to a n...
详细信息
ISBN:
(纸本)9781581139648
In this paper, we describe PUMAS [3], a framework based on Ubiquitous Agents for accessing Web Information Systems (WIS) through Mobile Devices (MD). The objective of PUMAS is to adapt the information delivered to a nomadic user (who often changes her/his location) according to her/his preferences, intentions and history in the system and, to the limited capacities of her/his MD. We use some AUML (Agent Unified Modelling Language) [11] diagrams for representing the messages exchange between the agents and the PUMAS components. Copyright 2005 acm.
The software processes can be analyzed, designed, and maintained as if it is a piece of software. This view enables the application of software engineering technologies to software process modeling (SPM) and process-c...
详细信息
ISBN:
(纸本)9781581139648
The software processes can be analyzed, designed, and maintained as if it is a piece of software. This view enables the application of software engineering technologies to software process modeling (SPM) and process-centered software engineering environment (PSEE). One reason for the relatively few applications of SPMs and PSEEs technologies in the software industry is that traditional software engineering technologies applied to the SPMs and PSEEs are not suitable for modeling software processes which are human-centered. This paper proposes an approach for applying agent technology, which has been accepted as a novel software engineering paradigm, to SPM and PSEE. In this approach, software processes are viewed as the collaboration of a group of process agents that know how to manage the software development activities and can act in the way software developers go about planning, enacting and reflecting on their work. An agent-based PSEE for enacting software processes under the proposed approach is also given in this paper. Copyright 2005 acm.
The sharing of tacit knowledge is a strategic factor for the success of software process, from a number of perspectives: training, project assimilation, and reducing noise in knowledge transfer. Pair programming is su...
详细信息
ISBN:
(纸本)9781581139648
The sharing of tacit knowledge is a strategic factor for the success of software process, from a number of perspectives: training, project assimilation, and reducing noise in knowledge transfer. Pair programming is supposed to be a practice suitable for this purpose. Unfortunately, the building of tacit knowledge is determined by factors that are difficult to isolate and capture because they concern personal attitude and capability. Thus, we have focused on the possible causes forming the individual ability, that can be isolated and studied, such as the individual education background. We have applied the practice of working in pairs to the design phase. We have made an experiment and a replica in academic environment, in order to understand the relationship between the building of knowledge through the practice and the individual background. In this paper we discuss the replica and compare the results with the first experiment's ones. Copyright 2005 acm.
暂无评论