A stochastic method is proposed based on decision analysis and Bayesian updating to monitor the cash and make short term decisions when a liquidity squeeze appears possible. The model involves uncertainties about the ...
详细信息
A stochastic method is proposed based on decision analysis and Bayesian updating to monitor the cash and make short term decisions when a liquidity squeeze appears possible. The model involves uncertainties about the payment time of outstanding bills sent out to customers and the updating of this information as the manager gets to know his customers through successive payments. The use of exponential utility functions allows simple computation of the benefits of this cash flow monitoring system. An illustrative example is used to assess the benefits of such a monitoring system.
In this paper we present a method to find the weighted median (WM) filter which is equivalent to a stack filter defined by a positive Boolean function. Because the cascade of WM filters can always be expressed as a si...
详细信息
In this paper we present a method to find the weighted median (WM) filter which is equivalent to a stack filter defined by a positive Boolean function. Because the cascade of WM filters can always be expressed as a single stack filter this allows us to express the cascade of WM filters as single WM filter. A direct application is the computation of the output distribution of a cascade of WM filters. The same method is used to find a nonrecursive expansion of a recursive WM filter;for example, the recursive three-point median filter is equivalent to infinite iteration of a certain nonrecursive WM filter. As applications of theoretical results, several interesting deterministic and statistical properties of WM filters are derived.
Solutions based on service-oriented architectures are promising in that they leverage common services and enable collaborative business processes that cross organizational boundaries. However, because Web services app...
详细信息
Solutions based on service-oriented architectures are promising in that they leverage common services and enable collaborative business processes that cross organizational boundaries. However, because Web services applications can span multiple hosts, operating systems, languages, and enterprises, it's problematic to measure, control, and manage application availability and performance. In addition to discussing the relationship of Web services' management to traditional distributed systems management, this survey explores various Web services management approaches and their underlying architectural concepts.
Bivalency argument is a widely-used technique that employs forward induction to show impossibility results and lower bounds related to consensus. However, for a synchronous distributed system of n processes with up to...
详细信息
Bivalency argument is a widely-used technique that employs forward induction to show impossibility results and lower bounds related to consensus. However, for a synchronous distributed system of n processes with up to t potential and f actual crash failures, applying bivalency argument to prove the lower bound for reaching uniform consensus is still an open problem. In this paper, we address this problem by presenting a bivalency proof that the lower bound for reaching uniform consensus is (f + 2) -rounds where 0 <= f <= t - 2. (c) 2005 Elsevier B.V. All rights reserved.
This paper introduces a scalable process event analysis approach, including parallel algorithms, to support efficient event correlation for big process data. It proposes a two-stages approach for finding potential eve...
详细信息
This paper introduces a scalable process event analysis approach, including parallel algorithms, to support efficient event correlation for big process data. It proposes a two-stages approach for finding potential event relationships, and their verification over big event datasets using MapReduce framework. We report on the experimental results, which show the scalability of the proposed methods, and also on the comparative analysis of the approach with traditional non-parallel approaches in terms of time and cost complexity.
To allow the distribution of control and visibility of cross-organizational process models and to increase availability and performance of the processes, a process model can be fragmented into logically different part...
详细信息
To allow the distribution of control and visibility of cross-organizational process models and to increase availability and performance of the processes, a process model can be fragmented into logically different parts and distributed in the enterprise architecture. Fragmentation algorithms and execution environments that connect the fragmented process model parts together, recreating the original process execution semantics, have been proposed in earlier works. However, a critical challenge that is left open is the ability to independently change the control structure of a process fragment. This is not trivial as changing the control structure of a specific fragment could break the global process execution. The global process overview is also not available anymore because it is fragmented in the enactment environment and many independent control structure changes could have already been done. In this paper, we describe an approach based on state reconstruction, which enables checking the admissibility of changes made to the control structure of a process fragment in a fragmented event-based process enactment environment.
One of the major trends in software engineering is the end of the dominance of Microsoft Corp. in the PC software market as a number of companies, such as Sun Microsystems Inc., Netscape Communication Corp., and Oracl...
详细信息
One of the major trends in software engineering is the end of the dominance of Microsoft Corp. in the PC software market as a number of companies, such as Sun Microsystems Inc., Netscape Communication Corp., and Oracle Systems Corp. began dominating the fastest-growing segment of the software market, the Internet. In addition to the Internet, another major factor in reshaping software engineering is Java, Sun Microsystems Inc.'s object-oriented language. Other trends and issues discussed include the increasing use of virtual reality in Web programming, new developments in computer sound, security concerns, and the so-called millennium problem related to the use of only the last two digits of a year in calculations, and the issue of software quality. (AIAA)
Considerable buzz surrounds artificial intelligence, and, indeed, AI is all around us. As with any software-based technology, it is also prone to vulnerabilities. Here, the author examines how we determine whether AI ...
详细信息
Considerable buzz surrounds artificial intelligence, and, indeed, AI is all around us. As with any software-based technology, it is also prone to vulnerabilities. Here, the author examines how we determine whether AI is sufficiently reliable to do its job and how much we should trust its outcomes.
The boundedness of the solutions of some second-order systems with large retardation is investigated on the basis of a comparison of solutions of nonlinear time-delay systems with a time-delay system whose solutions c...
详细信息
The boundedness of the solutions of some second-order systems with large retardation is investigated on the basis of a comparison of solutions of nonlinear time-delay systems with a time-delay system whose solutions ca be obtained.
We present a deterministic scalable overlay network. In contrast, most previous overlay networks use randomness or hashing (pseudo-randomness) to achieve a uniform distribution of data and routing traffic. (C) 2004 Pu...
详细信息
We present a deterministic scalable overlay network. In contrast, most previous overlay networks use randomness or hashing (pseudo-randomness) to achieve a uniform distribution of data and routing traffic. (C) 2004 Published by Elsevier B.V.
暂无评论