In this paper, we present a learning simulator that behaves like a student in a CAI (computer aided instruction) system. We call this simulator a student agent. The agent consists of an interface, an inference engine ...
详细信息
In this paper, we present a learning simulator that behaves like a student in a CAI (computer aided instruction) system. We call this simulator a student agent. The agent consists of an interface, an inference engine and an inductive logic programming (ILP) system. By using a student agent in a CAI system, a human student can learn as if the student is in a group learning situation. Other possible usage of the learning simulator includes checking the behavior of CAI systems, and for a teacher to check contents for study by observing the response of the simulator. The learning simulator learns interactively. We implement the student agent, using a Prolog interpreter and ILP system FOIL. We show learning results obtained through computer simulations.
The task of simulation neural networks with application of quantum calculations is considered. Such approach allows considering the task of pattern recognition and intelligence from new positions as application of qua...
详细信息
The task of simulation neural networks with application of quantum calculations is considered. Such approach allows considering the task of pattern recognition and intelligence from new positions as application of quantum methods, which allows solving tasks in ways unavailable in classical computers. Attention is focused on the problem of parallel calculation as the most important property providing a considerable growth of the calculating ability.
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful access control is needed to allow diffe...
详细信息
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful access control is needed to allow different access rights to different records of the same table. Traditional access control models that define a permission as the right of a user/role to perform a specific operation on a specific object cannot handle the enormous amount of objects and user/roles. In this paper, we propose an enhancement to role-based access control by introducing conditions that can be added to the traditional concept of permissions in order to keep the number of permissions small. Furthermore, we present an implementation of our access control model at the application programming level. Although access control is performed for every single database access, our solution completely separates access control from the application logic by using aspect-oriented programming. With this, access control can be integrated into a legacy 3-tier information system without changing the application programs.
A novel multilevel/analog electrically erasable programmable read only memory (EEPROM) cell fabricated by standard complementary metal oxide semiconductor (CMOS) logic process is presented. The cell is operated by sel...
详细信息
A novel multilevel/analog electrically erasable programmable read only memory (EEPROM) cell fabricated by standard complementary metal oxide semiconductor (CMOS) logic process is presented. The cell is operated by select-gate-controlled channel current induced drain avalanche hot hole for programming and hot electron for erasing. The self-convergent programming scheme is proposed allows this cell to be easily adopted for the multilevel or analog storage. In addition, a compact SPICE sub-circuit model of the cell has been established to facilitate cell behavior simulation with its interfacing circuits, especially for multilevel/analog nonvolatile memory applications.
We propose a resource-based model of human-computer interaction, and discuss how WIPPOG, a rule-based language for multiset transformations, can support such a model. WIPPOG is here adopted as an enactment mechanism f...
详细信息
We propose a resource-based model of human-computer interaction, and discuss how WIPPOG, a rule-based language for multiset transformations, can support such a model. WIPPOG is here adopted as an enactment mechanism for task models expressed by a visual notation. We exploit this resource-based perspective to model some common interaction errors and suggest possible prevention and mitigation strategies.
This paper deals with scheduling periodic real-time tasks on reconfigurable hardware devices, such as FPGAs. Reconfigurable hardware devices are increasingly used in embedded systems. To utilize these devices also for...
详细信息
This paper deals with scheduling periodic real-time tasks on reconfigurable hardware devices, such as FPGAs. Reconfigurable hardware devices are increasingly used in embedded systems. To utilize these devices also for systems with real-time constraints, predictable task scheduling is required. We formalize the periodic task scheduling problem and propose two preemptive scheduling algorithms. The first is an adaption of the well-known earliest deadline first (EDF) technique to the FPGA execution model. Although the algorithm reveals good scheduling performance, it lacks an efficient schedulability test and requires a high number of FPGA configurations. The second algorithm uses the concept of servers that reserve area and execution time for other tasks. Tasks are successively merged into servers, which are then scheduled sequentially. While this method is inferior to the EDF-based technique regarding schedulability, it comes with a fast schedulability test and greatly reduces the number of required FPGA configurations.
In this paper, we present the computational model of an agent for CSCL environments, based on the answer set programming (ASP) formalism. The complete model is formally presented in the declarative language of DLV, a ...
详细信息
In this paper, we present the computational model of an agent for CSCL environments, based on the answer set programming (ASP) formalism. The complete model is formally presented in the declarative language of DLV, a system for implementing ASP models. We propose a representation schema for the agent's beliefs about the learner and the domain, together with the corresponding inference system with the appropriate rules to derive new beliefs about the capabilities of the learner, and its use in order to support effective collaboration and maintain learning possibilities for the group members. The model proposed provides a representation of the structural knowledge frontier and the social knowledge frontier of the learner, which are the components for the definition of the learner's zone of proximal development (ZPD). Based on the ZPD of its learner the agent can propose her an intelligent learning task. The model includes a concept of group supportive task that allows the agents to maintain the ZPD for the learners in the group, as presented in the results.
The X4CP32 is an architecture that combines the parallel and reconfigurable paradigms. It consists of a grid of reconfigurable and programming units (RPUs), each one containing 4 cells (including a microprocessor in e...
详细信息
The X4CP32 is an architecture that combines the parallel and reconfigurable paradigms. It consists of a grid of reconfigurable and programming units (RPUs), each one containing 4 cells (including a microprocessor in each cell), responsible for all the processing and program flow. This paper presents architectural modifications in the X4CP32 in order to increase its performance. The RPU was implemented according to the VLIW (very long instruction word) methodology, and the cells were redesigned with a pipelined implementation. These improvements raised the maximum IPC of the RPU from 0.5 to 4 with an area overhead of 26%. To evaluate the new architecture, versions of the 2D discrete cosine transform, Montgomery modular multiplication and color space conversion were mapped, using the baseline architecture and the pipelined VLIW architecture.
DNS redirection and URL modification are two major ways to carry out dynamic replica selections in CDN. However, the two ways may overload DNS servers or dispatchers, and exhaust the network bandwidth while there are ...
详细信息
ISBN:
(纸本)0769522491
DNS redirection and URL modification are two major ways to carry out dynamic replica selections in CDN. However, the two ways may overload DNS servers or dispatchers, and exhaust the network bandwidth while there are a large number of incoming requests. Meanwhile, the modification of DNS servers for DNS redirection harms the compatibility and troubles the management. Moreover, the two ways do not give local administrators the flexibility to customize accesses to foreign CDN applications. In the paper we propose Java Application's Packet Eavesdropper (JAPE) for CDN to improve DNS redirection and URL modification, and for local administrators to control the accesses. JAPE utilizes packet interception technologies for Java objects to process packets. Besides, objects in JAPE are Java application rather than Java applet, which not only keeps the inherent portability but also has the flexibility to use various Java libraries for creating other applications not limited to CDN. We implement JAPE in Windows 2000 and develop a CDN application with an object doing DNS redirection and URL modification. The application with location-aware features can locally resolve clients' requests toward a virtual host name and redirect them to a nearby server customized by local administrators according to the movements of clients. It proves that JAPE for CDN can free DNS servers from modifications, alleviate DNS servers' and dispatchers' loads, conserve the network bandwidth, and permit local administrators to customize the accesses.
Text searching problem has been tackled by variety of traditional string matching approaches over the years. This paper proposes an intelligent text searching technique for information retrieval using probabilistic ap...
详细信息
Text searching problem has been tackled by variety of traditional string matching approaches over the years. This paper proposes an intelligent text searching technique for information retrieval using probabilistic approach, called mix heuristic algorithm (MHA). In the proposed algorithm, an intelligent programming approach using logical operators has been used that makes this algorithm intelligent and user friendly. We are also presenting a short survey of well-known sequential string matching algorithms. We test MHA implementation and present experimental results for different text matching.
暂无评论