Recent years have witnessed the rapid growth in the number of academics and practitioners who are interested in big scholarly data as well as closely-related areas. Quite a lot of papers reporting recent advancements ...
详细信息
ISBN:
(纸本)9781450369763
Recent years have witnessed the rapid growth in the number of academics and practitioners who are interested in big scholarly data as well as closely-related areas. Quite a lot of papers reporting recent advancements in this area have been published in leading conferences and journals. Both non-commercial and commercial platforms and systems have been released in recent years, which provide innovative services built upon big scholarly data to the academic community. Examples include Microsoft Academic Graph, Google Scholar, DBLP, arXiv, CiteSeerX, Web of Knowledge, Udacity, Coursera, and edX. the workshop will contribute to the birth of a community having a shared interest around big scholarly data and exploring it using knowledge discovery, data science and analytics, network science, and other appropriate technologies.
Service oriented architectures have been adopted by many organizations in order to increase business automation, integrate enterprise systems, and reach more business partners and customers. Among the business process...
详细信息
ISBN:
(数字)9783540754923
ISBN:
(纸本)9783540754916
Service oriented architectures have been adopted by many organizations in order to increase business automation, integrate enterprise systems, and reach more business partners and customers. Among the business processes that can greatly harness the advantages of web services are online auctions. this paper proposes a new approach for modeling online auctions and provides guidelines on how to use web service orchestration to model them. Our research involves the design of an auction server and its clients for manual as well as automated agent-based bidding. We propose a framework for a server that is generic enough to host various types of auctions and extensible enough for future component additions. We report on an implementation of our framework based on the BPEL web service orchestration language.
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carr...
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center. the papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. they reflect the authors' opinions and, in the interests of timely dissemination, are published as presented and without change. their inclusion in this publication does not necessarily constitute endorsement by the editors or the Institute of Electrical and Electronics Engineers, Inc.
this book constitutes the refereed proceedings of the 26thinternationalconference on Architecture of computingsystems, ARCS 2013, held in Prague, Czech Republic, in February 2013.the 29 papers presented were carefu...
详细信息
ISBN:
(数字)9783642364242
ISBN:
(纸本)9783642364235
this book constitutes the refereed proceedings of the 26thinternationalconference on Architecture of computingsystems, ARCS 2013, held in Prague, Czech Republic, in February 2013.
the 29 papers presented were carefully reviewed and selected from 73 submissions. the topics covered are
computer architecture topics such as multi-cores, memory systems, and parallel computing, adaptive system architectures such as reconfigurable systems in hardware and software, customization and application specific accelerators in heterogeneous architectures, organic and autonomic computing including boththeoretical and practical results on self-organization, self-configuration, self-optimization, self-healing, and self-protection techniques, operating systems including but not limited to scheduling, memory management, power management, RTOS, energy-awareness, and green computing.
We present efficient algorithms for dealing withthe problem of missing inputs (incomplete feature vectors) during training and recall. Our approach is based on the approximation of the input data distribution using P...
the polarity effect caused by the asymmetry and non-uniformity of electric field is one of the important basic characteristics of gas discharge, and the previous knowledge of polarity effect is mainly the differences ...
详细信息
Legal contracts have been used for millennia around the world as a foundation for business transactions. Smart con-tracts are cyber-physical systemsthat deploy Internet-of-things (IoT) and blockchain technologies to ...
详细信息
In this case study, we describe our use of ECT, a tool intended to simplify the design and development of network-spanning applications. We have used ECT throughout the course of a two-year collaboration, which has in...
详细信息
ISBN:
(纸本)9781605582474
In this case study, we describe our use of ECT, a tool intended to simplify the design and development of network-spanning applications. We have used ECT throughout the course of a two-year collaboration, which has involved individuals with expertise in a variety of fields, including interaction design and computer systems engineering. We describe our experiences withthis tool, with a particular focus on its emerging role in helping us to structure our collaboration. We conclude by presenting lessons that we have learned, and by suggesting future directions for the development of tools to support the design of network-spanning applications.
Reversible computing is a new paradigm that has emerged recently and extends the traditional forwards-only computing mode withthe ability to execute in backwards, so that computation can run in reverse as easily as i...
详细信息
Reversible computing is a new paradigm that has emerged recently and extends the traditional forwards-only computing mode withthe ability to execute in backwards, so that computation can run in reverse as easily as in forward. Two approaches to developing transition system (automaton -like) semantics for event structure models are distinguished in the literature. In the first case, states are considered as configurations (sets of already executed events), and transitions between states are built by starting from the initial configuration and repeatedly adding executable events. In the second approach, states are understood as residuals (model fragments that have not yet been executed), and transitions are constructed by starting from the given event structure as the initial state and deleting already executed (and conflicting) parts thereof during execution. the present paper focuses on an investigation of how the two approaches are interrelated for the model of prime event structures extended with cause-respecting reversibility. the bisimilarity of the resulting transition systems is proved, taking into account step semantics of the model under consideration.
the proceedings contain 30 papers. the special focus in this conference is on international Symposium on Fundamentals of Computation theory. the topics include: Distance-Based Covering Problems for60;Graphs of60...
ISBN:
(纸本)9783031435867
the proceedings contain 30 papers. the special focus in this conference is on international Symposium on Fundamentals of Computation theory. the topics include: Distance-Based Covering Problems for Graphs of Given Cyclomatic Number;an Efficient Computation of the Rank Function of a Positroid;minimizing Query Frequency to Bound Congestion Potential for Moving Entities at a Fixed Target Time;complexity of Conformant Election Manipulation;α - β -Factorization and the Binary Case of Simon’s Congruence;bounds for c-Ideal Hashing;parameterized Complexity of the th+1 -Free Edge Deletion Problem;on the Parallel Complexity of Group Isomorphism via Weisfeiler–Leman;the Complexity of (Pk, P) -Arrowing;on computing a Center Persistence Diagram;subhedge Projection for Stepwise Hedge Automata;robust Identification in the Limit from Incomplete Positive Data;cordial Forests;vertex Ordering with Precedence Constraints;forwards- and Backwards-Reachability for Cooperating Multi-pushdown systems;shortest Dominating Set Reconfiguration Under Token Sliding;computing Optimal Leaf Roots of Chordal Cographs in Linear Time;verified Exact Real Computation with Nondeterministic Functions and Limits;exact and Parameterized algorithms for the Independent Cutset Problem;kernelization for Finding Lineal Topologies (Depth-First Spanning Trees) with Many or Few Leaves;Two UNO Decks Efficiently Perform Zero-Knowledge Proof for Sudoku;the Rectilinear Convex Hull of Line Segments;power of Counting by Nonuniform Families of Polynomial-Size Finite Automata;domino Snake Problems on Groups;parsing Unranked Tree Languages, Folded Once;the Impact of State Merging on Predictive Accuracy in Probabilistic Tree Automata: Dietze’s Conjecture Revisited;computing Subset Vertex Covers in H-Free Graphs;on computing Optimal Temporal Branchings.
暂无评论