The main feature of active networks is to introduce programmability and the goal of it is to obtain flexibilities so as to meet a variety of needs for network applications much better. Heterogeneity and dynamics are t...
详细信息
ISBN:
(纸本)0780378652
The main feature of active networks is to introduce programmability and the goal of it is to obtain flexibilities so as to meet a variety of needs for network applications much better. Heterogeneity and dynamics are the main characteristics of grid computing. Active networks are fit for the computational grid. This paper discusses the influence of active networks on computational grid and presents and implements the active computational grid framework ACGWPRS: active computational grid framework - a Web based proxy of remote SP2.
Partner selection is an important decision problem in Agile Supply Chain. Since it is a non-analytical objective function and cannot be solved by general quantification methods, soft computing which is a fuzzy logic o...
详细信息
ISBN:
(纸本)0780378652
Partner selection is an important decision problem in Agile Supply Chain. Since it is a non-analytical objective function and cannot be solved by general quantification methods, soft computing which is a fuzzy logic operation embedded heuristic genetic algorithm is developed to obtain the optimal solution. The experiments of practical scale suggest that the model and methods are effective and possible to achieve optimal solution quickly.
Rough sets theory deals with representation, learning and generalization of uncertain knowledge. It can abstract underlying rules from data. Confidence is the criterion to scaling the reliability of rules. This paper ...
详细信息
ISBN:
(纸本)0780378652
Rough sets theory deals with representation, learning and generalization of uncertain knowledge. It can abstract underlying rules from data. Confidence is the criterion to scaling the reliability of rules. This paper synthesize and improve the prevenient researches on rule confidence in rough sets theory, and then give a novel and relatively complete approach to computing confidence, which considers effects on confidence caused by both imperfect and incompatible information. A medical example prove the validity of this approach.
It is very necessary for the mobile computing system to be equipped with the checkpointing recovery facility because of the fact that the MHs are vulnerable to the failures. Previous recovery schemes based on message ...
详细信息
ISBN:
(纸本)0780378652
It is very necessary for the mobile computing system to be equipped with the checkpointing recovery facility because of the fact that the MHs are vulnerable to the failures. Previous recovery schemes based on message logging are under the condition that exchanged messages among mobile hosts are forwarded by MSSs(m-MSS-m communication). A new recovery protocol is presented for mobile host direct to mobile host(m-m) communication wireless network in this paper. The m-m communication contributes to a less contention on the wireless network and a lower latency for message transmission than m-MSS-m. Theoretical analyses and simulation results show that the proposed approach provides higher performance in terms of fail-free overhead and recovery overhead than traditional schemes.
An approach is proposed to minimize a fuzzy feature evaluation index function by GA. Because not all evaluation indexes perform well, cross-entropy is introduced to measure the fuzziness of the evaluation function. Ex...
详细信息
ISBN:
(纸本)0780378652
An approach is proposed to minimize a fuzzy feature evaluation index function by GA. Because not all evaluation indexes perform well, cross-entropy is introduced to measure the fuzziness of the evaluation function. Experimental results showed that with the function of cross-entropy, a suitable evaluation index is chosen, the fuzziness is reduced and the corresponding clustering is optimized.
Existing traders support the required functions, such as the lookup and register of services. They are limited because they are either restricted to a small number of services or are using static information to deal w...
详细信息
Existing traders support the required functions, such as the lookup and register of services. They are limited because they are either restricted to a small number of services or are using static information to deal with dynamic environment. This paper presents a distributed and collaborative solution to the issues of query routing in the context of an open distributed computing environment to improve the performance of the core trader functions. The query routing mechanism we propose uses a dynamic information shared among different traders and let to better performance for traders specifically as well as agents in general.
In the ubiquitous computing environment (UCE), how to seamlessly provision the service or application to its occupant or its mobile user is an interesting research topic. This paper introduces our two UCEs called smar...
详细信息
ISBN:
(纸本)0780378652
In the ubiquitous computing environment (UCE), how to seamlessly provision the service or application to its occupant or its mobile user is an interesting research topic. This paper introduces our two UCEs called smart classroom (SCR) and intelligent meeting room (IMR) respectively. When a teacher gives his lesson in the SCR, different services will automatically be provisioned to him according to captured context information. When the users with various kinds of portable devices, such as PDA, mobile phone or laptop, attend a meeting in IMR, they can easily organize a meeting and unobtrusively access the services provided by IMR, for example, they could give presentation by "projector service". The paper also describes the software infrastructure of SCR and IMR - smart platform, a multi agents (MAs) system.
Bluff is a liar dice game that is quite popular in China and Hong Kong. As the rule of the game is simple and the game can be played with two to six people, it has become one of the sub-culture in local pub and club. ...
详细信息
Bluff is a liar dice game that is quite popular in China and Hong Kong. As the rule of the game is simple and the game can be played with two to six people, it has become one of the sub-culture in local pub and club. This paper introduces and formulate this dice game (in 2-person game form) as a kind of decision making problem. A risk-averse heuristic algorithm for playing the game is proposed. Preliminary testing results has indicated that this computer game program has already shown its minimal intelligence.
The graph is an important structure for representing objects and their relations. Its use in content-based image retrieval is still in its infancy, due to the lack of efficient algorithms for graph matching and graph ...
详细信息
The graph is an important structure for representing objects and their relations. Its use in content-based image retrieval is still in its infancy, due to the lack of efficient algorithms for graph matching and graph clustering. Like (vector) data clustering, graph clustering plays a key role in organizing images according to their content. In this paper, we propose a new graph clustering algorithm based on the k-means algorithm. The key elements of the new algorithm are an efficient graph matching algorithm for computing the similarity between two graphs and a new median graph algorithm for computing the median of a set of graphs. Random graphs and a synthetic image database are used to show the performance of the proposed algorithm.
This paper presents the conception of intelligent modeling of machine (IM) based on the research of human modeling. In this paper, "intelligence" means the capabilities of learning, discovery and creation; &...
详细信息
ISBN:
(纸本)0780378652
This paper presents the conception of intelligent modeling of machine (IM) based on the research of human modeling. In this paper, "intelligence" means the capabilities of learning, discovery and creation; "modeling" is the procedure to find out a proper solution to a problem or a reasonable interpretation of a phenomenon. This paper proposes that machines can discover key points among a series of analogical features and relationship of different problems or phenomena on the basis of its knowledge, and then it can build a target model by synthetically considering from multi aspects. After applying a new model to practice, then checking and estimating the result, which is an important feedback for learning and modeling. machine can adjust the model and its knowledge according to it. Therefore IM shows a humanlike modeling capability of machine and is able to lead to new scientific achievements.
暂无评论