Policy-based Autonomic Management monitors a system and its applications and tweaks performance parameters in real-time based on a set of governing policies. A policy specifies a set of conditions under which one or m...
ISBN:
(纸本)9780769539706
Policy-based Autonomic Management monitors a system and its applications and tweaks performance parameters in real-time based on a set of governing policies. A policy specifies a set of conditions under which one or more of a set of actions are to be performed. It is common that multiple policies' conditions are met simultaneously, each advocating actions. We propose a method of diagnosing the system to try to determine the best action or actions to perform in a given situation using Abductive Inference. We develop an original method of building a causality graph to facilitate diagnosis directly from a set of policies. Performance of the diagnosis method is measured by implementing diagnosis into an existing autonomic management application. the results are favourable when compared to previous methods of action selection.
the proceedings contain 48 papers. the topics discussed include: higher-order containers;on the completeness of quantum computation models;proofs, programs, processes;ergodic-type characterizations of algorithmic rand...
ISBN:
(纸本)3642139612
the proceedings contain 48 papers. the topics discussed include: higher-order containers;on the completeness of quantum computation models;proofs, programs, processes;ergodic-type characterizations of algorithmic randomness;how powerful are integer-valued martingales?;faster algorithm for finding minimum tucker submatrices;computability of countable subshifts;the limits of tractability in resolution-based propositional proof systems;graph structures and algorithms for query-log analysis;on the complexity of local search for weighted standard set problems;computational interpretations of analysis via products of selection functions;boole: from calculating numbers to calculating thoughts;approximability and hardness in multi-objective optimization;lower bounds for reducibility to the Kolmogorov random strings;spatial models for virtual networks;DNA rearrangements through spatial graphs;and on index sets of some properties of computable algebras.
Machine learning (ML) and genetic algorithm (GA) are well known techniques which can be used to calibrate environmental models. this paper investigates the calibration of the 2-D horizontal, vertically mixed lake mode...
详细信息
ISBN:
(纸本)9788890357411
Machine learning (ML) and genetic algorithm (GA) are well known techniques which can be used to calibrate environmental models. this paper investigates the calibration of the 2-D horizontal, vertically mixed lake models OneLay and PolTra using ML and GA routines. A GA was used jointly withthe Open Modelling Interface (OpenMI) wrapper approach on a single powerful server. Explicit and implicit gridded approaches withthe Probably Approximately Correct (PAC) learning were used as ML techniques. Monte Carlo simulations were used to generate the model input parameters for explicit and implicit gridding. Parallel computing using Shared Hierarchical Academic computing Network (SHARCNET) was used for explicit and implicit gridded approach calibration.
To meet the transmission security requirements of CNC systems, a message safety communication model, adopting two kinds of fault tolerance algorithms based on CNC dual ring bus, was presented. the safety communication...
详细信息
Recently, semi-supervised clustering has been remarked and discussed in many research fields. In semisupervised clustering, pairwise constraints such as must-link and cannot-link are often introduced to improve cluste...
详细信息
Recently, semi-supervised clustering has been remarked and discussed in many research fields. In semisupervised clustering, pairwise constraints such as must-link and cannot-link are often introduced to improve clustering results or properties. In this paper, we will propose a new semisupervised fuzzy c-means clustering for data with clusterwise tolerance with pairwise constraints. First, the concept of clusterwise tolerance and pairwise constraints are introduced. Second, the optimization problem of fuzzy c-means clustering for data with clusterwise tolerance with pairwise constraints is formulated. third, a new clustering algorithm is constructed based on the above mathematical discussions. Finally, the effectiveness of proposed algorithm is verified through numerical examples.
the proceedings contain 65 papers. the topics discussed include: change the game or win the war: the metaphor matters;coordinating and guiding federal, state and private sector cybersecurity initiatives;cyber physical...
ISBN:
(纸本)9781450300179
the proceedings contain 65 papers. the topics discussed include: change the game or win the war: the metaphor matters;coordinating and guiding federal, state and private sector cybersecurity initiatives;cyber physical systems R&D at DHS science and technology directorate;next generation computing: the rise of the utility in a future that is cloudy with scattered security;holistic cyber approach;securing the perimeter: challenges in enforcing global access control;how google tests software;a break down in trust, the emerging threat of cyber crime in connection with our dependence on web 2.0 technologies;cyber science: moving from the toes to the shoulders of giants;cyberspace policy review and blueprint for research priorities;risk mitigation strategies: lessons learned from actual insider attacks;and mission assurance: challenges and opportunities.
this paper considers the performance enhancement of orthogonal space time block coded (OSTBC) multiple-input multiple-output system based on an optimal training strategy. Pairwise error probability (PEP) based perform...
详细信息
Energy constraint is the most critical problem in wireless sensor networks (WSNs). To address this issue, clustering has been introduced as an efficient way for routing. However, the available clustering algorithms do...
详细信息
Consistency maintenance (CM) techniques are a crucial part of many distributed systems, and are particularly important in networked games. In this paper we describe a framework of the human factors of CM, to help desi...
详细信息
In this paper, we consider a multi-hop sensor network, where the network topology is a tree, TDMA is employed as medium access control, and all data generated at sensor nodes are delivered to a sink node located on th...
详细信息
暂无评论