The proceedings contain 21 papers. The special focus in this conference is on Formal Modeling. The topics include: From service identification to service selection: An interleaved perspective;towards a system model fo...
ISBN:
(纸本)9783642249327
The proceedings contain 21 papers. The special focus in this conference is on Formal Modeling. The topics include: From service identification to service selection: An interleaved perspective;towards a system model for ensembles;algorithmic aspects of risk management;parameterized metareasoning in membership equational logic;fast sort computations for order-sorted matching and unification;Solving the first verified software competition problems using PVS;towards a maude formal environment;multisimulations: Towards next generation integrated simulation environments;semantics, simulation, and formal analysis of modeling languages for embedded systems in real-time maude;honoring carolyn talcott’s contributions to science;computationalbiology: A programming perspective;applications of pathway logic modeling to target identification;ten years of analyzing actors: Rebeca experience;mathematical models of object-based distributed systems;From explicit to symbolic types for communication protocols in CCS;Abstract LR-parsing;fractionated software for networked cyber-physical systems: Research directions and long-term vision;model feasible interactions in distributed real-time systems;puff, the magic protocol.
For the first time, this paper tries to explain the origins of diseases caused by unstable DNA repeats, known as dynamic mutations. It is common to find fairly simplified correlation between the number of DNA repeats ...
详细信息
For the first time, this paper tries to explain the origins of diseases caused by unstable DNA repeats, known as dynamic mutations. It is common to find fairly simplified correlation between the number of DNA repeats and severity of diseases. By examining the case studies, it is possible to see that simplified model does not reflect real condition of the patients, so we have proposed more complex model which involves gender, immunological condition, age of onset and analysis of family tree. Conclusions are related to known molecular biology phenomenon such as DNA methylation, histone binding and RNA secondary structure.
Bayesian networks (BN) are probabilistic graphical models which are widely utilized in modeling complex biological interactions in the cell. Learning the structure of a BN is an NP-hard problem and existing exact and ...
详细信息
Bayesian networks (BN) are probabilistic graphical models which are widely utilized in modeling complex biological interactions in the cell. Learning the structure of a BN is an NP-hard problem and existing exact and heuristic solutions do not scale to large enough domains to allow for meaningful modeling of many biological processes. In this work, we present efficient parallel algorithms which push the scale of both exact and heuristic BN structure learning. We demonstrate the applicability of our methods by implementations on an IBM Blue Gene/L and an AMD Opteron cluster, and discuss their significance for future applications to systems biology.
The knowledge gained from biology datasets can streamline and speed-up pharmaceutical development. However, computational models generate so much information regarding protein behavior that large-scale analysis by tra...
详细信息
The Human Immune System (HIS) employs multilevel defense against harmful and unseen pathogens through innate and adaptive immunity. Innate immunity protects the body from the known invaders whereas adaptive immunity d...
详细信息
The Human Immune System (HIS) employs multilevel defense against harmful and unseen pathogens through innate and adaptive immunity. Innate immunity protects the body from the known invaders whereas adaptive immunity develops a memory of past encounter and has the ability to learn about previously unknown pathogens. These salient features of the HIS are inspiring the researchers in the area of intrusion detection to develop automated and adaptive defensive tools. This paper presents a new variant of Conserved Self Pattern Recognition Algorithm (CSPRA) called CSPRA-ID (CSPRA for Intrusion Detection). The CSPRA-ID is given the capability of effectively identifying known intrusions by utilizing the knowledge of well-known attacks to build a conserved self pattern (APC detector) while it retains the ability to detect novel intrusions because of the nature of one-class classification of the T detectors. Furthermore, the T detectors in the CSPRA-ID are generated with a novel near-deterministic scheme that is proposed in this paper. The near-deterministic generation scheme places the detector with Brute Force method to guarantee the next detector to be very foreign to the existing detector. Moreover, the placement of the variable-sized detector is online determined during the Monte Carlo estimate of detector coverage and thus the detectors with an optimal distribution are generated without any additional optimization step. A comparative study between CSPRA-ID and one-class SVM shows that the CSPRA-ID is promising on DARPA network intrusion data in terms of detection accuracy and computation efficiency.
The trend in life sciences research, particularly in molecular evolutionary systematics, is toward larger data sets and ever-more detailed evolutionary models, which can generate substantial computational loads. Over ...
详细信息
The trend in life sciences research, particularly in molecular evolutionary systematics, is toward larger data sets and ever-more detailed evolutionary models, which can generate substantial computational loads. Over the past several years we have developed a grid computing system aimed at providing researchers the computational power needed to complete such analyses in a timely manner. Our grid system, known as The Lattice Project, was the first to combine two models of grid computing - the service model, which mainly federates large institutional HPC resources, and the desktop model, which harnesses the power of PCs volunteered by the general public. Recently we have developed a "science portal" style web interface that makes it easier than ever for phylogenetic analyses to be completed using GARLI, a popular program that uses a maximum likelihood method to infer the evolutionary history of organisms on the basis of genetic sequence data. This paper describes our approach to scheduling thousands of GARLI jobs with diverse requirements to heterogeneous grid resources, which include volunteer computers running BOINC software. A key component of this system provides a priori GARLI runtime estimates using machine learning with random forests.
The human being should be awarded the championship of navigation on the planet, on the virtues that they not only have invented and manufactured the compass, GPS, aircraft, vessel, spacecraft, but also have demonstrat...
详细信息
ISBN:
(纸本)9781424473502
The human being should be awarded the championship of navigation on the planet, on the virtues that they not only have invented and manufactured the compass, GPS, aircraft, vessel, spacecraft, but also have demonstrated exceptional non-instrumental navigation skills. The Austronesian expansion from the Asian mainland into the Pacific performed by the Pacific navigators, who eventually populated the most remote islands of the Pacific about 4000 years ago, is a vivid example (Wehner 1998). However, animals, especially flying birds and insects are strong contenders. Monarch butterflies can migrate up to 2000 miles from their reproductive sites in the eastern US and Canada to their over-wintering sites in the forests of Mexico, and it is postulated that they may possess a biological equivalent of a low-resolution GPS system that is based on the magnetic field of the earth. In fact, even the long-legged ants (Cataglyphis fortis) in the Saharan desert use the dead-reckoning navigation strategy, which is attributed to the Polynesians, but the ants apparently have acquired the capability much earlier, given the relative short evolutionary history of humans. In this article, we briefly review the state-of-the-art research on insect navigation and communication used in flight and communication, with the objective to inspire cross-disciplinary studies in aerospace engineering, biology and computer science. After a brief review, we overview and identify seven cross-disciplinary research topics that may draw on inspirations from insect navigation and communication in flight and migration. These topics include: ants colony inspired swarm intelligence, honeybee inspired group decision-making, insect sociobiology, MAV/mobile robot flight control and remote control of insect flights, optimal migration strategy, Quorum sensing, and joining and collision avoidance for MAV fleet control. An interesting question one may pose is: given the rich and advanced navigation and communication t
biology can offer insight into how realistic artificial agents and complex interactions between them can be created. For instance, spotted hyenas of Western Africa typically hunt alone, but cooperate once in a while t...
详细信息
biology can offer insight into how realistic artificial agents and complex interactions between them can be created. For instance, spotted hyenas of Western Africa typically hunt alone, but cooperate once in a while to catch zebras. Using hyenas as motivation, this paper evaluates three potential factors that affect the evolution of cooperation in a team of game agents: reward structure (i.e. whether fitness reward is given to an individual agent or shared by the team), coordination mechanism (i.e. stigmergic vs. direct communication), and net return (i.e. the size of reward relative to the difficulty of obtaining it). Through neuroevolution using Multi-Component ESP [1], three predators were evolved in a field containing multiple fixed-behavior prey. Six such experiments show that (1) although shared reward strongly promotes cooperation, it is not strictly necessary for evolving cooperation; (2) although stigmergic coordination works well in simple, unambiguous tasks (i.e. with a single prey), direct communication is more effective in more complex tasks (i.e. with multiple prey); and (3) the predators evolve to hunt alone or cooperatively based on which approach results in higher net return. Insights from these computational simulations can be used to develop more intelligent behaviors for game agents in the future.
暂无评论