Many systems have been developed in the past few years to assist researchers in the discovery of knowledge published as English text, for example in the PubMed database. At the same time, higher level collective knowl...
详细信息
ISBN:
(纸本)2951740840
Many systems have been developed in the past few years to assist researchers in the discovery of knowledge published as English text, for example in the PubMed database. At the same time, higher level collective knowledge is often published using a graphical notation representing all the entities in a pathway and their interactions. We believe that these pathway visualizations could serve as an effective user interface for knowledge discovery if they can be linked to the text in publications. Since the graphical elements in a Pathway are of a very different nature than their corresponding descriptions in English text, we developed a prototype system called PathText. the goal of PathText is to serve as a bridge between these two different representations. In this paper, we first describe the overall architecture and the interfaces of the PathText system, and then provide some details about the core Text Mining components.
this paper contains the presentation of a virtual environment which allows rapid design and verification of human prostheses. Initially the platform was created for inferior limb prostheses, but it is usable for any k...
详细信息
ISBN:
(纸本)9780889867307
this paper contains the presentation of a virtual environment which allows rapid design and verification of human prostheses. Initially the platform was created for inferior limb prostheses, but it is usable for any kind of prostheses. the system enables a virtual testing of the prosthetic models, control systems, sensors and a comparison between the real prosthesis and the virtual one. In a virtual environment, we can perform tests on larger sets of configurations, in a very short time and at a very low cost.
Ambient Networks enable co-operation between heterogeneous networks, on demand, in order to provide ubiquitous connectivity to end-users. We focus on the part of disseminating context information to enable context-bas...
详细信息
ISBN:
(纸本)9780769534923
Ambient Networks enable co-operation between heterogeneous networks, on demand, in order to provide ubiquitous connectivity to end-users. We focus on the part of disseminating context information to enable context-based applications (for e.g., resource update and management) and systems in ambient and uhiquitous networks. Our pure overlay, space architecture acts as a base for the development and maintenance of application-layer context-aware dissemination protocols. Our multi-level overlay network based dissemination protocol exhibits dynamic and fair context dissemination. In this paper, we first overview this 'pure overlay' and 'multi-level overlay' combined context dissemination scheme and discuss its constraints in autonomous and heterogeneous environments. M, then focus on proposing techniques for improving this dissemination scheme towards ubiquitous networking which satisfies our goals with regard to creating a user-friendly data model. the proposed optimizations include: local transformations, personalized extensions. and hybrid customizations. this paper is complemented with case study evaluation and simulation study results.
Formal models of rational user behaviour are essential for user-centred reasoning about interactive systems. At an abstract level, planned behaviour and reactive behaviour are two important aspects of the rational beh...
详细信息
ISBN:
(纸本)9780769534374
Formal models of rational user behaviour are essential for user-centred reasoning about interactive systems. At an abstract level, planned behaviour and reactive behaviour are two important aspects of the rational behaviour of users for which existing cognitive modelling approaches are too detailed. In this paper, we propose a novel treatment Of these aspects within our formal framework of cognitively plausible behaviour We develop an abstract, formal model of rational behaviour as a game between two opponents. Intuitively, an Angel abstractly represents the planning aspects, whereas a Demon represents the reactive aspects of user behaviour the formalisation is carried out within the MOCHA framework and is illustrated by simple examples of interactive tasks.
Service providers as we know them nowadays are the always-on "static" web service providers, that aim at Five9 availability (99.999%). Formal, or de-facto, standards, such as WSDL and BPEL, have become techn...
详细信息
ISBN:
(纸本)9780769533735
Service providers as we know them nowadays are the always-on "static" web service providers, that aim at Five9 availability (99.999%). Formal, or de-facto, standards, such as WSDL and BPEL, have become technology enablers for the easy discovery, use and coordination of such services. However, we envisage tomorrow's services to become increasingly pervasive, being deployed within buildings, transport systems, markets, as well as people portable devices. Such services will be, by their own nature, simple and fine grained, as a consequence, service composition will become crucial to deliver rich functionalities that satisfy end users requests. Composing services in mobile environments opens up significant challenges. In particular, the Five9 availability assumption no longer holds: the higher the dynamic nature of the environment, the higher the chances that services will move out-of-reach before the composition completes, causing the service as a whole to fail. We argue that, in order to enable the successful completion of compound services, the reliability of the composition must be measured and reasoned about. In order to do so, we propose to dynamically deploy a prediction model to estimate the duration of colocation between component services. these estimates are fed in input to a service composition semantics reasoner, which then autonomically selects those providers, within the current environment, that maximise the chances of successful compound service completion. We demonstrate the positive impact that the reliability reasoning has onto the ratio of successfully completed compound services in a typical human movement scenario.
Understanding the structure of large existing (and evolving) software systems is a major challenge for software engineers. In reverse engineering, we aim to compute, for a given software system, a decomposition of the...
详细信息
ISBN:
(纸本)9781605580791
Understanding the structure of large existing (and evolving) software systems is a major challenge for software engineers. In reverse engineering, we aim to compute, for a given software system, a decomposition of the system into its subsystems. CCVISU is a lightweight tool that takes as input a software graph model and computes a visual representation of the system's structure, i.e., it structures the system into separated groups of artifacts that are strongly related, and places them in a 2- or 3-dimensional space. Besides the decomposition into subsystems, it reveals the relatedness between the subsystems via interpretable distances. the tool reads a software graph from a simple text file in RSF format, e.g., call, inheritance, containment, or co-change graphs. the resulting system structure is currently either directly presented on the screen, or written to an output file in SVG, VRML, or plain text format. the tool is designed as a reusable software component, easy to use, and easy to integrate into other tools;it is based on efficient algorithms and supports several formats for data interchange.
In this paper, we propose a semi-supervised learning (SSL) algorithm based on local and global regularization. In the local regularization part, our algorithm constructs a regularized classifier for each data point us...
详细信息
In his 1917 "On Quantum theory of Radiation" paper Albert Einstein introduced the concept of amplification of radiation through stimulated emission with coherence. this concept had not been applied in practi...
详细信息
ISBN:
(纸本)9780819473790
In his 1917 "On Quantum theory of Radiation" paper Albert Einstein introduced the concept of amplification of radiation through stimulated emission with coherence. this concept had not been applied in practice until 1952 when Joseph Weber, followed by Townes, Basov and Prokhorov, developed the theory and started working on the construction of masers. the first maser was demonstrated by Townes' team in 1953. Many researchers began thinking about making an "optical maser", but the transition from centimeter to nanometer waves posed a problem. Well funded researchers in the USA and Soviet Union put their efforts into making an "optical maser". In May 16, 1960 an unknown and underfunded researcher, theodore Harold Maiman, won the race and demonstrated a fully functional ruby laser. the scientific world was astonished by its simplicity and elegance. Maiman's short paper describing the invention appeared immediately in Nature magazine. this invention caused an avalanche of new laser developments followed by the growing number of applications in almost all fields of our lives. Ted Maiman died in 2007 in Vancouver, just 13 days before the 47(th) anniversary of the invention of the laser. the intention of this paper is to focus on the life of the scientific maverick and great man.
these proceedings deal with a selection of papers presented at the 8thinternationalconference CASYS07, on computing ANTICIPATORY systems, 6-11 August 2007, held at HEC Management School - University of Liege, Lige, ...
ISBN:
(纸本)9780735405790
these proceedings deal with a selection of papers presented at the 8thinternationalconference CASYS07, on computing ANTICIPATORY systems, 6-11 August 2007, held at HEC Management School - University of Liege, Lige, Belgium. the content of these proceedings deals withthe most recent Research & Development in the area of theoretical developments and applications in the modelling and computing of anticipation in any fields of natural and artificial systems. A computing anticipatory system is a system that computes its current states in taking into account its past and present states but also its potential future states. Strong anticipation refers to an anticipation of events built by or embedded in a system. Weak anticipation refers to an anticipation of events predicted or forecasted from a model of a system. this volume contains the first invited lecture Neural Approach to Machine Consciousness, by Prof. Dr Igor Aleksander, FREng (UK) who received the CHAOS AWARD, and the second invited lecture Quantum Mechanics, Pattern Recognition, and the Mammalian Brain, by Dr George Chapline (USA) who received the CASYS AWARD. the peer reviewed papers that received a BEST PAPER AWARD at CASYS07, and some invited papers are included in these proceedings. Adel F. Antippa (Canada) and Daniel M. Dubois (Belgium) presented the continuation of their original research project on discrete physics withtheir third fundamental paper Synchronous Discrete Harmonic Oscillator that also appears in these proceedings. the interdisciplinary outstanding topics of these proceedings are readable by researchers and scientists with a university background.
Concurrency problems, such as deadlocks, Should lie identified early in the design process. this is made increasingly difficult as larger and more Complex concurrent systems are being developed. We propose here in app...
详细信息
ISBN:
(纸本)9783540878742
Concurrency problems, such as deadlocks, Should lie identified early in the design process. this is made increasingly difficult as larger and more Complex concurrent systems are being developed. We propose here in approach, based on the analysis of specific models expressed in the Unified Modeling Language (UML) that uses a specifically designed genetic algorithm to detect deadlocks. Our main motivations are (1) to devise practical solutions that are applicable in the context of UML design without requiring additional modeling and (2) to achieve scalable automation. All relevant concurrency information is extracted front systems' UML models that comply withthe UML Schedulability, Performance and Time profile, a standardized specialization of UML for real-time, Concurrent systems. Our genetic algorithm is then used to search for execution sequences exhibiting deadlocks. Results On three case studies show that our approach can achieve efficient results.
暂无评论